ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2016 International Conference on Information Science and Security (ICISS)
Latest Publications
TOTAL DOCUMENTS
44
(FIVE YEARS 0)
H-INDEX
4
(FIVE YEARS 0)
Published By IEEE
9781509054930
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
A Hybrid Threat Model for Software Security Requirement Specification
2016 International Conference on Information Science and Security (ICISS)
◽
10.1109/icissec.2016.7885836
◽
2016
◽
Author(s):
Habeeb Omotunde
◽
Rosziati Ibrahim
Keyword(s):
Software Security
◽
Security Requirement
◽
Threat Model
◽
Requirement Specification
Download Full-text
An Improved Smartcard for the South African Social Security Agency (SASSA): A Proof of Life Based Solution
2016 International Conference on Information Science and Security (ICISS)
◽
10.1109/icissec.2016.7885842
◽
2016
◽
Cited By ~ 4
Author(s):
Sthembile Mthethwa
◽
Graham Barbour
◽
Mamello Thinyane
Keyword(s):
Social Security
◽
South African
◽
The South
◽
Social Security Agency
Download Full-text
Fuzzy Clustering and Association Rule for Improvement of Visitor Spots in the Lanna
2016 International Conference on Information Science and Security (ICISS)
◽
10.1109/icissec.2016.7885855
◽
2016
◽
Author(s):
Jirawat Teyakome
◽
Narissara Eiamkanitchat
◽
Korawan Sangkakorn
◽
Phichit Napook
Keyword(s):
Fuzzy Clustering
◽
Association Rule
Download Full-text
Application of ICT for Exercise Data Management
2016 International Conference on Information Science and Security (ICISS)
◽
10.1109/icissec.2016.7885843
◽
2016
◽
Author(s):
Seungae Kang
◽
Sunyoung Kang
Keyword(s):
Data Management
Download Full-text
A Memory Accessing Method for the Parallel Aho-Corasick Algorithm on GPU
2016 International Conference on Information Science and Security (ICISS)
◽
10.1109/icissec.2016.7885837
◽
2016
◽
Cited By ~ 3
Author(s):
JinMyung Yoon
◽
Kang-Il Choi
◽
HyunJin Kim
Download Full-text
Handwritten Music Symbol Classification Using Deep Convolutional Neural Networks
2016 International Conference on Information Science and Security (ICISS)
◽
10.1109/icissec.2016.7885856
◽
2016
◽
Cited By ~ 2
Author(s):
Sangkuk Lee
◽
Sung Joon Son
◽
Jiyong Oh
◽
Nojun Kwak
Keyword(s):
Neural Networks
◽
Convolutional Neural Networks
◽
Deep Convolutional Neural Networks
◽
Music Symbol
◽
Symbol Classification
Download Full-text
Prioritizing software maintenance plan by analyzing user feedback
2016 International Conference on Information Science and Security (ICISS)
◽
10.1109/icissec.2016.7885865
◽
2016
◽
Author(s):
Kittiya Srewuttanapitikul
◽
Pornsiri Muengchaisri
Keyword(s):
Software Maintenance
◽
User Feedback
◽
Maintenance Plan
Download Full-text
Utilizing a Distributed Publish/Subscribe System for Connecting Online Shopping Services with Social Funding Projects
2016 International Conference on Information Science and Security (ICISS)
◽
10.1109/icissec.2016.7885871
◽
2016
◽
Author(s):
Hyeon Gyu Kim
◽
Sung Soo Kim
Keyword(s):
Online Shopping
Download Full-text
Enhanced Weighted Method for Test Case Prioritization in Regression Testing Using Unique Priority Value
2016 International Conference on Information Science and Security (ICISS)
◽
10.1109/icissec.2016.7885851
◽
2016
◽
Cited By ~ 2
Author(s):
Asmaa Ammar
◽
Salmi Baharom
◽
Abdul Azim Abd Ghani
◽
Jamilah Din
Keyword(s):
Regression Testing
◽
Test Case
◽
Test Case Prioritization
Download Full-text
Trusted Data Travel Blogs Information Focusing on Followers
2016 International Conference on Information Science and Security (ICISS)
◽
10.1109/icissec.2016.7885869
◽
2016
◽
Author(s):
Nurul Akhmal binti Mohd Zulkefli
◽
Roznim binti Mohamad Rasli
◽
Baharum bin Baharudin
Keyword(s):
Trusted Data
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close