default search action
ICCST 2014: Rome, Italy
- International Carnahan Conference on Security Technology, ICCST 2014, Rome, Italy, October 13-16, 2014. IEEE 2014, ISBN 978-1-4799-3530-7
- Josep Aguilera, Fernan Gallego, Carles Silva:
System on Chip (SoC): New generation of video surveillance systems. 1-5 - Ester Ciancamerla, B. Fresilli, Michele Minichino, Tatiana Patriarca, Serguei Iassinovski:
An electrical grid and its SCADA under cyber attacks: Modelling versus a Hybrid Test Bed. 1-6 - Andreas Nautsch, Christian Rathgeb, Christoph Busch:
Bridging Gaps: An application of feature warping to online signature verification. 1-6 - Stefan Michel, Nicole Hättenschwiler, Milena Kuhn, Nadine Strebel, Adrian Schwaninger:
A multi-method approach towards identifying situational factors and their relevance for X-ray screening. 1-6 - Roberto Setola, Domenico Lorusso, Maria Carla De Maggio:
Dependencies analysis in emergency scenarios. 1-6 - El-Arkam Mechhoud, Mounira Rouainia:
Automated dependability analysis of a HDPE reactor. 1-5 - Vittorio Bianco, Melania Paturzo, A. Finizio, Lisa Miccio, Pietro Ferraro:
Revealing fire survivors hidden behind smoke and flames by IR active imaging systems. 1-3 - Myunghee Son, Okgee Min, Jonghyun Kim, Sung Hoon Baek:
A safer way to share a car based on SNS to increase use efficiency of released vehicles. 1-6 - Sung Choi, Michael Bierma, Yung Ryn Choe, David Zage:
EMBERS: EpheMeral biometrically enhanced real-time location System. 1-6 - Richard M. Guest, Oscar Miguel-Hurtado, Sarah V. Stevenage, Greg J. Neil, Sue Black:
Biometrics within the SuperIdentity project: A new approach to spanning multiple identity domains. 1-6 - Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi:
Securing software cryptographic primitives for embedded systems against side channel attacks. 1-6 - Dakshina Ranjan Kisku, Debanjan Chatterjee, S. Trivedy, Massimo Tistarelli:
Face image abstraction by Ford-Fulkerson algorithm and invariant feature descriptor for human identification. 1-6 - Rawande Karadaghi, Heinz Hertlein, Aladdin M. Ariyaeeinia:
Effectiveness in open-set speaker identification. 1-6 - Ondrej Kainz, Frantisek Jakab:
Web-based interface for real-time movement monitoring. 1-4 - Mofreh A. Hogo:
Temporal analysis of intrusion detection. 1-6 - Basel Hasan, Viktor Dmitriyev, Jorge Marx Gómez, Joachim Kurzhöfer:
A framework along with guidelines for designing secure mobile enterprise applications. 1-6 - Diana Hardmeier, Catharina Muller, Adrian Schwaninger:
Certification of airport security officers using multiple-choice tests: A pilot study. 1-6 - Jeremy Weese:
Developing an industry standard for data communications between PIDS equipment and third party systems. 1-3 - Addisson Salazar, Gonzalo Safont, Luis Vergara:
Surrogate techniques for testing fraud detection algorithms in credit card operations. 1-6 - Le Zhang, Chip-Hong Chang, Alessandro Cabrini, Guido Torelli, Zhi-Hui Kong:
Leakage-resilient memory-based physical unclonable function using phase change material. 1-6 - Emanuele Frontoni, Marco Baldi, Primo Zingaretti, Vincenzo Landro, Paolo Misericordia:
Security issues for data sharing and service interoperability in eHealth systems: The Nu.Sa. test bed. 1-6 - Mario Di Mauro, Maurizio Longo:
Skype traffic detection: A decision theory based tool. 1-6 - Maurizio Aiello, Enrico Cambiaso, Maurizio Mongelli, Gianluca Papaleo:
An on-line intrusion detection approach to identify low-rate DoS attacks. 1-6 - Carey M. Rappaport, Borja Gonzalez-Valdes, José Ángel Martínez Lorenzo:
Advanced portal-based multistatic millimeter-wave radar imaging for person security screening. 1-5 - Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi, Saman A. Zonouz:
Security challenges in building automation and SCADA. 1-6 - Liliana Gonzalez, Mayra Zurbarán, Pedro M. Wightman, Daladier Jabba, Miguel Jimeno, Eduardo E. Zurek:
Sensitivity analysis and countermeasures for transformation-based location obfuscation. 1-6 - Pierluigi Pelargonio, Marco Pugliese:
Enhancing security in public transportation services of Roma: The PANDORA system. 1-6 - Noura Ben Hadjy Youssef, Wajih El Hadj Youssef, Mohsen Machhout, Rached Tourki, Kholdoun Torki:
Instruction set extensions of AES algorithms for 32-bit processors. 1-5 - Dan Cristian Dinca, Jeffrey Schubert:
Rapid inspection of general aviation aircraft for security threats and contraband. 1-5 - Doug Rhoades:
Machine actionable indicators of compromise. 1-5 - Michael Brockly, Stephen J. Elliott, Jarron Burdine, Michael Frost, Matthew Riedle, Richard M. Guest:
An investigation into biometric signature capture device performance and user acceptance. 1-5 - Roberto Bubbico, Barbara Mazzarotta:
Security risk assessment of process plants: The role of layout. 1-6 - Ivan Homoliak, Daniel Ovsonka, Karel Koranda, Petr Hanácek:
Characteristics of buffer overflow attacks tunneled in HTTP traffic. 1-6 - Mark D. Murton, Paul Johnston, Russell Waymire, Deborah Belasich:
A fidelity framework for small arms combat. 1-7 - Juan Camilo Vásquez-Correa, Nicanor García, Jesús Francisco Vargas-Bonilla, Juan Rafael Orozco-Arroyave, Julián David Arias-Londoño, M. O. Lucia Quintero:
Evaluation of wavelet measures on automatic detection of emotion in noisy and telephony speech signals. 1-6 - Maha Althobaiti, Pam J. Mayhew:
Security and usability of authenticating process of online banking: User experience study. 1-6 - Soodamani Ramalingam, Mike Rhead, Robert Gurney:
Impact of character spacing on the performance of Automatic Number Plate Recognition (ANPR) systems through simulation. 1-6 - Francesco Archetti, Divna Djordjevic, Ilaria Giordani, Raul Sormani, Francesco Tisato:
A reasoning approach for modelling and predicting terroristic attacks in urban environments. 1-6 - Zahid Akhtar, Christian Micheloni, Gian Luca Foresti:
Liveness detection for biometric authentication in mobile applications. 1-6 - Sondre Skatter, Stephan Olesinski:
Energy-resolving photon-counting detectors in CT based explosive detection systems (EDS): Can additional material signatures be extracted to help the detection task? 1-6 - Javier Galbally, Iwen Coisel, Ignacio Sanchez:
A probabilistic framework for improved password strength metrics. 1-6 - Ignacio de Mendizábal-Vázquez, Daniel de Santos-Sierra, Javier Guerra Casanova, Carmen Sanchez-Avila:
Supervised classification methods applied to keystroke dynamics through mobile devices. 1-6 - Angelo Furfaro, Alfredo Garro, Andrea Tundis:
Towards Security as a Service (SecaaS): On the modeling of Security Services for Cloud Computing. 1-6 - Lorena Guachi, Giuseppe Cocorullo, Pasquale Corsonello, Fabio Frustaci, Stefania Perri:
A novel background subtraction method based on color invariants and grayscale levels. 1-5 - Fernando Martín Rodríguez:
Automatic optical reading of passport information. 1-4 - Francesco Di Maio:
Centralized security governance for air navigation services: Innovative strategies to confront emerging threats against Civil Aviation. 1-6 - Alessia De Rosa, Alessandro Piva, Marco Fontani, Massimo Iuliani:
Investigating multimedia contents. 1-6 - Justin Varghese, Omer Bin Hussain, Bijoy Babu, Jamshid M. Basheer, Subash Saudia, Mohamed Ramadan Saadi, Mohamed Samiulla Khan:
An efficient DCT-SVD based algorithm for digital image watermarking. 1-6 - Simona Capparella, Maria Carmen Falvo:
Secure faults detection for preventing fire risk in PV systems. 1-5 - Daniele Codetta Raiteri, Luigi Portinale, Roberta Terruggia:
Quantitative evaluation of attack/defense scenarios through Decision Network modelling and analysis. 1-6 - Flavia Demarinis, Antonella Accettura, Fabio Garzia, Roberto Cusani:
Automatic security system for recognizing unexpected motions through video surveillance. 1-5 - Claudia Meda, Federica Bisio, Paolo Gastaldo, Rodolfo Zunino:
A machine learning approach for Twitter spammers detection. 1-6 - Mario Di Mauro, Cesario Di Sarno:
A framework for Internet data real-time processing: A machine-learning approach. 1-6 - Andy Belyavin:
Simulating the impact of remote screening on search comb capacity. 1-6 - Belen Fernandez-Saavedra, Raul Sánchez-Reillo, Judith Liu-Jimenez, Jorge Gutierrez Ruiz:
Best practices for the security evaluation of biometric systems. 1-6 - Raul Sánchez-Reillo, Daniel Sierra-Ramos, Roberto Estrada-Casarrubios, Jose A. Amores-Duran:
Strengths, weaknesses and recommendations in implementing biometrics in mobile devices. 1-6 - Daniel de Santos-Sierra, Miguel F. Arriaga-Gómez, Gonzalo Bailador, Carmen Sanchez-Avila:
Low computational cost multilayer graph-based segmentation algorithms for hand recognition on mobile phones. 1-5 - Daniele Pinchera, Marco Donald Migliore:
Secret key sharing by means of reconfigurable antenna systems. 1-3 - Mohamad El-Abed, Mostafa Dafer, Ramzi El Khayat:
RHU Keystroke: A mobile-based benchmark for keystroke dynamics systems. 1-4 - Miguel F. Arriaga-Gómez, Ignacio de Mendizábal-Vázquez, Rodrigo Ros-Gomez, Carmen Sanchez-Avila:
A comparative survey on supervised classifiers for face recognition. 1-6 - Martin Henzl, Petr Hanácek, Matej Kacic:
Preventing real-world relay attacks on contactless devices. 1-6 - Michele Scarpiniti, Fabio Garzia:
Security monitoring based on joint automatic speaker recognition and blind source separation. 1-6 - Roberto Mugavero, Giovanni Saggio, Valentina Sabato, Mariano Bizzarri:
The multisensory integrated modules for training. 1-6 - Ignacio Sanchez, Riccardo Satta, Igor Nai Fovino, Gianmarco Baldini, Gary Steri, David Shaw, Andrea Ciardulli:
Privacy leakages in Smart Home wireless technologies. 1-6 - Anika Pflug, Pascal Nicklas Paul, Christoph Busch:
A comparative study on texture and surface descriptors for ear biometrics. 1-6 - Victor Bautista Saiz, Fernan Gallego:
GPU: Application for CCTV systems. 1-4 - Stanislav Vítek, Milos Klima, Lukas Krasula:
Video compression technique impact on efficiency of person identification in CCTV systems. 1-5 - Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Real-time Security & Dependability monitoring: Make it a bundle. 1-6 - Sara Marina Salvador, Riccardo Maggiora, Daniele Milanesio, Giorgio Rodighiero:
An anti-intrusion protection barrier based on 2D radar technology. 1-4 - Ed Rao, Jim Remer, Douglas Bauer:
A model for development, transition and technology transfer leading to commercialization of security technology. 1-5 - Tereza Malachova, Jindrich Malach, Zdenek Vintr:
TARGI - A novel tool and method for target identification. 1-5 - Luis Andrés Cardona, B. Lorente, Carles Ferrer:
Partial crypto-reconfiguration of nodes based on FPGA for WSN. 1-4 - Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Norman Poh:
On the effect of time efficiency in DSV under stress. 1-5 - Masaki Fujikawa, Ryosuke Kamai, Sou Tsunetsugu, Michiko Ogawa:
Transparent cut detection sensor: Proposal of the security device that makes information leakage by photo/video shooting diffucult. 1-6 - Noura Ben Hadjy Youssef, Wajih El Hadj Youssef, Mohsen Machhout, Rached Tourki, Kholdoun Torki:
A low-resource 32-bit datapath ECDSA design for embedded applications. 1-6 - Aldona Zalewska, Tomasz Sikora, A. Buczkowska:
Screening technology based on DMS as an effective tool to help protect public and vital infrastructure from threats. 1-4 - Vladimir Smejkal, Jindrich Kodl:
Assessment of the authenticity of Dynamic Biometric Signature: The results of experiments. 1-5 - Joanna Putz-Leszczynska, Miroslaw Granacki:
Gait biometrics with a Microsoft Kinect sensor. 1-5 - Flaviano Tessitore:
Aerial surveillance and airborne remote sensing techniques in Guardia di Finanza: An operational experience: Guardia di Finanza and CRdC BENECON, police officers and university researchers to protect and safeguard social fairness and legality. 1-6 - Sara Manzoni, Simone Sterlacchini:
Evacuation study by crowd dynamics micro-simulation to support disaster prevention and management: The case of SIMULATOR project. 1-6 - Apostolis Zarras:
The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security. 1-6 - Aythami Morales, Miguel A. Ferrer, Moisés Díaz Cabrera, Cristina Carmona, Gordon L. Thomas:
The use of hyperspectral analysis for ink identification in handwritten documents. 1-5 - Gio Kao, Han Lin, Brandon Eames, Jason J. Haas, Alexis Fisher, John Michalski, Jon Blount, Jason R. Hamlet, Erik Lee, John Gauthier, Gregory D. Wyss, Ryan Helinski, Dustin Franklin:
Supply chain lifecycle decision analytics. 1-7 - Simona Cavallini, Francesca D'Onofrio, Sara Bouchon, Claudia Giusto:
Enhancing transport security: Characterization and identification of the main security challenges in 5 transport subsectors. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.