Cloudlet-based for big data collection in body area networks
Quwaider, Muhannad, Jararweh, Yaser
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding
Social engineering in social networking sites: Affect-based model
Algarni, Abdullah, Yue Xu, Taizan Chan, Yu-Chu Tian
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding
Sentiment analysis of arabic social media content: a comparative study
Khasawneh, Rawan T., Wahsheh, Heider A., Al Kabi, Mohammed N., Aismadi, Izzat M.
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding
ICITST-2013: Keynote speaker 4: Writing a sustainable research paper
Shoniregun, Charles A.
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding
RISC'13 Workshop: Keynote speaker 5
Yoon Seok Chang
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding
Anomaly detection in Online Social Networks using structure-based technique
Rezaei, Abdolazim, Kasirun, Zarinah Mohd, Rohani, Vala Ali, Khodadadi, Touraj
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding
Broker-based Cross-Cloud Federation Manager
Abdo, Jacques Bou, Demerjian, Jacques, Chaouchi, Hakima, Barbar, Kabalan, Pujolle, Guy
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding
Design and development of Anti-XSS proxy
Shahriar, Hossain, North, Sarah, Wei-Chuen Chen, Mawangi, Edward
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding
A taxonomy for securely sharing information among others in a trust domain
Arachchilage, Nalin Asanka Gamagedara, Namiluko, Cornelius, Martin, Andrew
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding
Analysis of security attacks on AODV routing
Abdelshafy, Mohamed A., King, Peter S. B.
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding
Access control enforcement in Named Data Networking
Hamdane, Balkis, Serhrouchni, Ahmed, Fatmi, Sihem Guemara Ei
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding
Analysing and attacking the 4-way handshake of IEEE 802.11i standard
Alabdulatif, Abdullah, Xiaoqi Ma, Nolle, Lars
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding
ICITST-2013: Keynote speaker 2: Security challenge of TOR and the deep web
Stupples, David
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01.12.2013)
Get full text
Conference Proceeding