


default search action
12th ICITST 2017: Cambridge, UK
- 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017. IEEE 2017, ISBN 978-1-908320-93-3

Keynotes
- Charles Kim:

Keynote speaker 1: Cyber-resilient ICS through diversified redundancy and intrusion detection. 15 - Evangelos Pournaras:

Keynote speaker 2: Participatory self-management systems for resilient smart cities. 16 - Gary B. Wills:

Keynote speaker 3: Looking after our IP in supply chain. 17 - Anne E. James:

Keynote speaker 4: Cloud forensics. 18 - Steven Furnell:

Keynote speaker 5: Taming security technology. 19 - Enrico Malfa:

Keynote speaker 6: Steel made in Europe: The backbone of sustainability. 20
Workshops
Workshop 1: Chaos-based Data Protection, Data Security and Hiding in Multimedia Communications (CDP-DSHMC 2017)
- Tasnime Omrani, Rabei Becheikh, Olfa Mannai, Rhouma Rhouma

, Safya Belghith
:
RARE: A robust algorithm for rapid encryption. 23-28 - Marwa Saidi

, Houcemeddine Hermassi, Rhouma Rhouma
, Safya Belghith
:
LSB-hamming based chaotic steganography (LH-Steg). 29-34 - Nabil Abdoun

, Safwan El Assad, Khodor Hammoud
, Rima Assaf, Mohamad Khalil
, Olivier Déforges:
New keyed chaotic neural network hash function based on sponge construction. 35-38 - Desislav Andreev

, Simona Petrakieva, Ina Taralova
:
Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information. 39-42 - Ta Thi Kim Hue

, Thang Manh Hoang
, An Braeken
:
Lightweight signcryption scheme based on discrete Chebyshev maps. 43-47
Workshop 2: The 8th International Workshop on Cloud Applications and Security (CAS'17)
- Muhammad Saqib Niaz, Gunter Saake:

Forward secure searchable symmetric encryption. 49-54 - Deepak Janardhanan, Enda Barrett:

CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models. 55-60 - Rachael Shaw, Enda Howley

, Enda Barrett:
An advanced reinforcement learning approach for energy-aware virtual machine consolidation in cloud data centers. 61-66 - Martin Duggan, Karl Mason, Jim Duggan, Enda Howley

, Enda Barrett:
Predicting host CPU utilization in cloud computing using recurrent neural networks. 67-72
Sessions
Session 1: Information Security
- Christophe Feltus, Erik H. A. Proper

:
Towards a security and privacy co-creation method. 75-80 - Roman Graf, Ross King:

Secured transactions technique based on smart contracts for situational awareness tools. 81-86 - Messaouda Boumaraf, Fatiha Merazka

:
Speech encryption based on hybrid chaotic key generator for AMR-WB G.722.2 codec. 87-91 - Ferda Ernawan

, Muhammad Nomani Kabir
, Zuriani Mustaffa
:
A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection. 92-97 - Fredrik Blix, Salah Addin Elshekeil, Saran Laoyookhong:

Data protection by design in systems development: From legal requirements to technical solutions. 98-103
Session 2: Cyber Security
- Saja Alqurashi, Omar Batarfi:

A comparison between API call sequences and opcode sequences as reflectors of malware behavior. 105-110 - Basil Alothman

, Prapa Rattadilok
:
Android botnet detection: An integrated source code mining approach. 111-115 - Fayez Alotaibi, Nathan L. Clarke

, Steven Furnell:
An analysis of home user security awareness & education. 116-122 - Shaikha AlShehyari, Chan Yeob Yeun

, Ernesto Damiani:
Monitoring darknet activities by using network telescope. 123-128 - Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki

:
Enhancing cyber security awareness with mobile games. 129-134
Session 3: Wireless Networking and Communication
- Shinsaku Kiyomoto, Anirban Basu, Mohammad Shahriar Rahman

, Sushmita Ruj:
On blockchain-based authorization architecture for beyond-5G mobile services. 136-141 - Daehee Kim, Jaekeun Yun, Sungjun Kim:

Hybrid public key authentication for wireless sensor networks. 142-143 - Norah S. Farooqi

:
Intelligent safety management system for crowds using sensors. 144-147 - Abdullah Alhumaidi Alotaibi, Marios C. Angelides:

A hybrid approach for femtocell co-tier interference mitigation. 148-153
Session 4: Internet Application and Technology
- Aspen Olmsted

:
Entity identity, performance, and storage. 155-160 - Ashik Mostafa Alvi, Md. Faqrul Islam Shaon, Prithvi Ranjan Das, Manazir Mustafa, Mohammad Rezaul Bari:

Automated course management system. 161-166 - Omotayo Kayode Abatan, Manoj S. Maharaj:

Change management and the integration of information technology: Research notes from selected African universities. 167-172 - Victor Clincy, Hossain Shahriar

:
Web service injection attack detection. 173-178 - Ahyoung Kim, Junwoo Lee:

Mobile business performance metrics: Framework and case study. 179-184
Session 5: Internet Applications and Technology
- Luis F. Mejia-Ricart, Paul Helling, Aspen Olmsted

:
Evaluate action primitives for human activity recognition using unsupervised learning approach. 186-188 - Pasha Sadeghian, Casey Wilson, Stephen Goeddel, Aspen Olmsted

:
Classification of music by composer using fuzzy min-max neural networks. 189-192 - Pasha Sadeghian, Aspen Olmsted

:
Assessment of fuzzy min-max neural networks for classification tasks. 193-196 - Huicong Loi, Aspen Olmsted

:
Low-cost detection of backdoor malware. 197-198 - Walter Blair, Aspen Olmsted

, Paul Anderson:
Docker vs. KVM: Apache spark application performance and ease of use. 199-201
Session 6: Internet Applications and Technology
- Ryan Lile, Aspen Olmsted

:
Meaningful sandbox data. 203-204 - Elizabeth Healy, Husna Siddiqui, Aspen Olmsted

:
Classifying influenza outbreaks by analyzing and filtering Twitter data. 205-207 - Casey Wilson, Aspen Olmsted

:
Handling an organization's communication needs with a single web service. 208-209 - Andrew Bissada, Aspen Olmsted

:
Mobile multi-factor authentication. 210-211 - William Kennedy, Aspen Olmsted

:
Three factor authentication. 212-213
Session 7: Infonomics and e-Technology
- Md. Tomig Uddin Ahmed, Nazrul Islam Bhuiya, Md. Mahbubur Rahman:

A secure enterprise architecture focused on security and technology-transformation (SEAST). 215-220 - Ahana Roy, Aspen Olmsted

:
Distributed query processing and data sharing. 221-224 - Rio Guntur Utomo

, Robert John Walters, Gary B. Wills
:
Factors affecting the implementation of information assurance for eGovernment in Indonesia. 225-230 - Chatipot Srimuang, Nagul Cooharojananone, Uthai Tanlamai, Achara Chandrachai, Kanokwan Atchariyachanvanich

:
The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM. 231-236
Session 8: Wireless Networking and Communication
- Faris A. Almalki, Marios C. Angelides:

Propagation modelling and performance assessment of aerial platforms deployed during emergencies. 238-243 - Callum Brill, Thomas Nash:

A comparative analysis of MANET routing protocols through simulation. 244-247 - Omego Obinna

, Eckhard Pfluegel
, Charles A. Clarke, Martin J. Tunnicliffe:
A multi-channel steganographic protocol for secure SMS mobile banking. 248-253
Session 9: Cyber Security
- Igor Ivkic

, Stephan Wolfauer, Thomas Oberhofer, Markus Gerhard Tauber
:
On the cost of cyber security in smart business. 255-260 - Sanjay Kumar, Ari Viinikainen

, Timo Hämäläinen
:
Evaluation of ensemble machine learning methods in mobile threat detection. 261-268 - Abidullah Zarghoon, Irfan Awan, Jules Pagna Disso, Richard Dennis:

Evaluation of AV systems against modern malware. 269-273 - Lamya Alqaydi, Chan Yeob Yeun

, Ernesto Damiani:
Security enhancements to TLS for improved national control. 274-279
Session 10: Information Security
- Basil Alothman

, Prapa Rattadilok
:
Towards using transfer learning for Botnet Detection. 281-282 - Timibloudi S. Enamamu, Nathan L. Clarke

, Paul S. Haskell-Dowland
, Fudong Li:
Transparent authentication: Utilising heart rate for user authentication. 283-289 - Thomas Nash, Aspen Olmsted

:
Performance vs. security: Implementing an immutable database in MySQL. 290-291
Session 11: Cloud Security
- Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogério de Lemos:

An architecture for privacy-preserving sharing of CTI with 3rd party analysis services. 293-297 - Abeer F. Alkhwaldi

, Mumtaz M. Kamala, Rami Qahwaji
:
From e-govemment to cloud-government: Challenges of Jordanian citizens' acceptance for public services. 298-304 - Alaa Altorbaq, Fredrik Blix, Stina Sorman:

Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPR. 305-310 - Shuaiyi Bu, Shuxin Yang, Haoming Ji:

Distributed computing framework in security: Case study of encryption method. 311-318
Session 12: Infonomics and e-Technology
- Yen-Mei Lee:

Seeking academic information on the Internet: Doctoral students' Internet self-efficacy and emotions. 320-324 - Paweena Wanchai:

Customer churn analysis : A case study on the telecommunication industry of Thailand. 325-331 - Haya Alshehri, Farid Meziane

:
The influence of advanced and secure e-commerce environments on customers behaviour: The case of Saudis in the UK. 332-337
Session 13: Infonomics and e-Technology
- Paul Helling, Ahana Roy, Aspen Olmsted

:
Effects of lexicon size on solving bananagrams. 339-341 - Anderson Holguin Avila, Brigitte Rodriguez Mendoza

, Maria Bohorquez Sotelo, Delgadillo Loaiza Juan Sebastian:
Work in Progress: Nobody knows who you really are online/on the world wide web - Amazon-recognition-service based 'Virtualnet' supported authentication: How certain are you it is indeed you in front of a screen? 342-345 - Wayne Chen, Aspen Olmsted

:
Considerations for OSV over Linux-based virtual machines. 346-348 - Seamus Dowling

, Michael Schukat, Hugh Melvin:
Using analysis of temporal variances within a honeypot dataset to better predict attack type probability. 349-354
Session 14: Internet Applications and Technology
- Thomas Briggs, Aspen Olmsted

:
Client side calculation of 'bacon number'. 356-358 - Prathap Siddavaatam, Reza Sedaghat, Aakriti Tarun Sharma:

intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networks. 359-364 - Clara Bertolissi, Omar Boucelma, Worachet Uttha:

Enhancing security in the cloud: When traceability meets access control. 365-366 - Cameron Hamilton, Aspen Olmsted

:
Database multi-factor authentication via pluggable authentication modules. 367-368
Session 15: Internet Applications and Technology
- Blake Badders, Aspen Olmsted

:
Improve CRUD performance on hierarchical data: Nested interval model vs. nested set model. 370-371 - Juhua Liu, Wei Li, Guoqiang Bai:

Efficient hardware implementation of ITUbee for lightweight application. 372-376 - Stephen Goeddel, Pasha Sadeghian, Aspen Olmsted

:
Weighing the shopping benefits of a smarter refrigerator. 377-378 - Preston T. Owens, Aspen Olmsted

:
Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based framework. 379-380
Session 16: Cloud Security and Digital Forensics
- Roland Pellegrini, Patrick Rottmann, Georg Strieder:

Preventing vendor lock-ins via an interoperable multi-cloud deployment approach. 382-387 - Shahlaa Mashhadani

, Hiba Al-Kawaz
, Nathan L. Clarke
, Steven Furnell, Fudong Li:
A novel multimedia-forensic analysis tool (M-FAT). 388-395 - Thomas Zefferer

, Dominik Ziegler
, Andreas Reiter:
Best of two worlds: Secure cloud federations meet eIDAS. 396-401
Session 17: Infonomics and e-Technology
- Husna Siddiqui, Aspen Olmsted

, Brendan Keane:
Venmo: Exposing a user's lifestyle. 403-404 - Philip McShane, Darryl Stewart:

Challenge based visual speech recognition using deep learning. 405-410 - Nagul Cooharojananone, Krittika Akasarakul, Thipsuda Wongkhamdi, Phonkornkrit Pruetthiwongwanich, Kanokwan Atchariyachanvanich

:
The study of the local community products (OTOP) website characteristics toward buyer decision using eye tracking. 411-416 - W. P. Yuen, K. B. Chuah:

Data visibility and trust enhancement of enterprise customers in cloud computing services. 417-422
Session 18: Information and Cyber Security
- Ahana Roy, Louis Mejia, Paul Helling, Aspen Olmsted

:
Automation of cyber-reconnaissance: A Java-based open source tool for information gathering. 424-426 - Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic

, Markus Gerhard Tauber
, Alexander Wöhrer:
Towards a security baseline for IaaS-cloud back-ends in Industry 4.0. 427-432 - Daniel Fischer

, Bernd Markscheffel, K. Scherr:
Secure e-mail communication - Comparison and selection of encryption solutions using an utility value analysis approach. 433-435 - Igor Ivkic

, Markus Gerhard Tauber
, Alexander Wöhrer:
Towards comparing programming paradigms. 436-437
Session 19: Intelligent Control
- Ahmad Bennakhi

, Mohamed A. Jeragh:
Applying dynamic verification tagging to the k-anonymity model. 439-443 - Kritika Kongsoontornkijkul, Rath Pichyangkura, Pakpachong Vadhanasindhu, Kanlaya Vanichbuncha:

A study of factors effecting Thailand talent mobility programme: Case of university and food technology industry. 444-449 - Thomas Nash, Aspen Olmsted

:
shinySDM: Point and click species distribution modeling. 450-451 - Seth Stoudenmier, Aspen Olmsted

:
Efficient retrieval of information from hierarchical REST requests. 452-454
Session 20: Information Security and Intelligent Control
- Kouya Tochikubo:

Multiple assignment secret sharing scheme using hierarchical threshold scheme. 456-461 - Husna Siddiqui, Elizabeth Healy, Aspen Olmsted

:
Bot or not. 462-463 - Yichen Ma, Fuyao Wang, Zhuozheng Wang:

Intelligent laboratory management system based on Internet of Things. 464-467
Session 21: Infonomics and e-Technology
- Walter Blair, Aspen Olmsted

, Paul Anderson:
Spark framework for transcriptomic trimming algorithm reduces cost of reading multiple input files. 469-471 - Luis F. Mejia-Ricart, Aspen Olmsted

:
Avoiding unnecessary deaths: Drag-Back, a deadlock avoidance model. 472-474 - Khurram Mahmood, Zainab Nayyar, Hafiz Mushtaq:

Role of transformational leadership on e-govemment switching: Multi-channel and digital divide. 475-478 - Keshnee Padayachee

, Elias Worku:
Shared situational awareness in information security incident management. 479-483 - Michelle G. Cacais, Gilvandenys Leite Sales

:
A collaborative system for corporate performance evaluation using gamification and the learning vectors model. 484-489
Session 22: Infonomics and e-Technology
- Casey Wilson, Anna V. Sandifer, Aspen Olmsted

:
Designing an assembly language using MIT App inventor. 491-493 - Ali Aydin Selçuk

, Fatih Orhan, Berker Batur:
Undecidable problems in malware analysis. 494-497 - Wren Chan, Aspen Olmsted

:
Ethereum transaction graph analysis. 498-500 - Anna V. Sandifer, Casey Wilson, Aspen Olmsted

:
Detection of fake online hotel reviews. 501-502

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














