ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2015 International Carnahan Conference on Security Technology (ICCST)
Latest Publications
TOTAL DOCUMENTS
80
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By IEEE
9781479986903, 9781479986910
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Benefit of construct information security environment based on lightweight virtualization technology
2015 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2015.7389695
◽
2015
◽
Cited By ~ 3
Author(s):
Jen-Chieh Wang
◽
Wei-Fun Cheng
◽
Han-Chiang Chen
◽
Hung-Li Chien
Keyword(s):
Information Security
◽
Security Environment
◽
Virtualization Technology
Download Full-text
Off-line signature stability by optical flow: Feasibility study of predicting the verifier performance
2015 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2015.7389707
◽
2015
◽
Cited By ~ 1
Author(s):
Moises Diaz
◽
Miguel A. Ferrer
◽
Giuseppe Pirlo
◽
Giuliano Giannico
◽
Patricia Henriquez
◽
...
Keyword(s):
Optical Flow
◽
Feasibility Study
Download Full-text
An event-based SDN architecture for network security analysis
2015 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2015.7389675
◽
2015
◽
Cited By ~ 1
Author(s):
Po-Ching Lin
◽
Jyun-Chen Liu
◽
Pin-Ren Chiou
Keyword(s):
Network Security
◽
Security Analysis
◽
Event Based
Download Full-text
Cyber security risk assessment using an interpretable evolutionary fuzzy scoring system
2015 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2015.7389674
◽
2015
◽
Author(s):
Chih-Hung Hsieh
◽
Wei-Chieh Chao
◽
Pei-Wen Liu
◽
Chao-Wen Li
Keyword(s):
Risk Assessment
◽
Cyber Security
◽
Scoring System
◽
Security Risk
◽
Security Risk Assessment
Download Full-text
An audio secret sharing system based on fractal encoding
2015 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2015.7389684
◽
2015
◽
Cited By ~ 3
Author(s):
Jing-Zhong Wang
◽
Tian-Xi Wu
◽
Tsung-Ying Sun
Keyword(s):
Secret Sharing
◽
Fractal Encoding
Download Full-text
Comparative analysis of Governmental Countermeasures to cyber attacks
2015 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2015.7389664
◽
2015
◽
Author(s):
Lee Heon Soo
Keyword(s):
Comparative Analysis
◽
Cyber Attacks
Download Full-text
A resistant digital image watermarking scheme based on masking model
2015 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2015.7389701
◽
2015
◽
Cited By ~ 2
Author(s):
Didi Rosiyadi
◽
Shi-Jinn Horng
◽
Nova Hadi Lestriandoko
Keyword(s):
Digital Image
◽
Image Watermarking
◽
Digital Image Watermarking
◽
Watermarking Scheme
Download Full-text
[Copyright notice]
2015 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2015.7389727
◽
2015
◽
Keyword(s):
Copyright Notice
Download Full-text
Outsourced data tagging via authority and delegable auditing for cloud storage
2015 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2015.7389670
◽
2015
◽
Cited By ~ 1
Author(s):
Yongjun Ren
◽
Jian Shen
◽
Jin Wang
◽
Liming Fang
Keyword(s):
Cloud Storage
◽
Outsourced Data
Download Full-text
Speaker identification experiments under gender De-identification
2015 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2015.7389702
◽
2015
◽
Author(s):
Marcos Faundez-Zanuy
◽
Enric Sesa-Nogueras
◽
Stefano Marinozzi
Keyword(s):
Speaker Identification
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close