ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2019 International Carnahan Conference on Security Technology (ICCST)
Latest Publications
TOTAL DOCUMENTS
45
(FIVE YEARS 45)
H-INDEX
3
(FIVE YEARS 3)
Published By IEEE
9781728115764
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Implications of the Method of Construction of UK Number Plates for Infrared Reflectance and Camera Settings on ANPR System
2019 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2019.8888400
◽
2019
◽
Author(s):
Michael Rhead
◽
Soodamani Ramalingam
◽
Rob Gurney
◽
William E Martin
◽
Andrew Jones
Keyword(s):
Infrared Reflectance
Download Full-text
Template protection approaches: Fuzzy Vault scheme
2019 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2019.8888405
◽
2019
◽
Author(s):
Wendy Ponce-Hernandez
◽
Ramon Blanco-Gonzalo
◽
Raul Sanchez-Reillo
◽
Judith Liu-Jimenez
Keyword(s):
Fuzzy Vault
◽
Template Protection
Download Full-text
HRF (HTTP Request Filtering): A New Detection Mechanism of EDoS Attack on Cloud
2019 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2019.8888431
◽
2019
◽
Author(s):
B. Basaveswara Rao
◽
Suneetha Bulla
◽
K. Gangadhara Rao
◽
K. Chandan
Keyword(s):
Detection Mechanism
Download Full-text
Face Image Analysis in Mobile Biometric Accessibility Evaluations
2019 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2019.8888437
◽
2019
◽
Author(s):
Barbara Corsetti
◽
Raul Sanchez-Reillo
◽
Richard M. Guest
◽
Marco Santopietro
Keyword(s):
Image Analysis
◽
Face Image
◽
Face Image Analysis
Download Full-text
Identification and prevention of social engineering attacks on an enterprise
2019 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2019.8888441
◽
2019
◽
Author(s):
Purushotham Parthiban Parthy
◽
Gowthamaraj Rajendran
Keyword(s):
Social Engineering
Download Full-text
Interior Intrusion Detection System
2019 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2019.8888412
◽
2019
◽
Author(s):
M. Vincent
◽
P. Arumugam
◽
G. Prabhakara Rao
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
Download Full-text
A Study on Security Considerations in IoT Environment and Data Protection Methodologies for Communication in Cloud Computing
2019 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2019.8888414
◽
2019
◽
Author(s):
K.B. Sarmila
◽
S.V. Manisekaran
Keyword(s):
Cloud Computing
◽
Data Protection
Download Full-text
Securing GOOSE: The Return of One-Time Pads
2019 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2019.8888435
◽
2019
◽
Author(s):
Kwasi Boakye-Boateng
◽
Arash Habibi Lashkari
Download Full-text
Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy
2019 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2019.8888419
◽
2019
◽
Cited By ~ 16
Author(s):
Iman Sharafaldin
◽
Arash Habibi Lashkari
◽
Saqib Hakak
◽
Ali A. Ghorbani
Keyword(s):
Denial Of Service
◽
Distributed Denial Of Service
◽
Ddos Attack
Download Full-text
Software Implementation of an Automatic Movable Road Barrier
2019 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2019.8888417
◽
2019
◽
Author(s):
Roopa Ravish
◽
Varun R. Gupta
◽
K J Nagesh
◽
Amruth Karnam
◽
Shanta Rangaswamy
Keyword(s):
Software Implementation
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close