ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2015 Conference on Information Assurance and Cyber Security (CIACS)
Latest Publications
TOTAL DOCUMENTS
21
(FIVE YEARS 0)
H-INDEX
5
(FIVE YEARS 0)
Published By IEEE
9781467379144
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Securing mobile Wireless Sensor Networks (WSNs) against Clone Node Attack
2015 Conference on Information Assurance and Cyber Security (CIACS)
◽
10.1109/ciacs.2015.7395566
◽
2015
◽
Cited By ~ 3
Author(s):
Mumtaz Qabulio
◽
Yasir Arfat Malkani
◽
Ayaz Keerio
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Mobile Wireless
◽
Mobile Wireless Sensor Networks
◽
Mobile Wireless Sensor
Download Full-text
Organizing committee
2015 Conference on Information Assurance and Cyber Security (CIACS)
◽
10.1109/ciacs.2015.7395558
◽
2015
◽
Download Full-text
[Copyright notice]
2015 Conference on Information Assurance and Cyber Security (CIACS)
◽
10.1109/ciacs.2015.7395555
◽
2015
◽
Keyword(s):
Copyright Notice
Download Full-text
Message from organizing committee
2015 Conference on Information Assurance and Cyber Security (CIACS)
◽
10.1109/ciacs.2015.7395557
◽
2015
◽
Download Full-text
Self adaptations in access control models in context of cloud computing
2015 Conference on Information Assurance and Cyber Security (CIACS)
◽
10.1109/ciacs.2015.7395569
◽
2015
◽
Author(s):
Maryam Sajjad
◽
Hirra Anwar
◽
Muhammad Awais Shibli
Keyword(s):
Cloud Computing
◽
Access Control
◽
Access Control Models
◽
Control Models
Download Full-text
Distributed intrusion detection system using mobile agents in cloud computing environment
2015 Conference on Information Assurance and Cyber Security (CIACS)
◽
10.1109/ciacs.2015.7395559
◽
2015
◽
Cited By ~ 13
Author(s):
Yasir Mehmood
◽
Muhammad Awais Shibli
◽
Ayesha Kanwal
◽
Rahat Masood
Keyword(s):
Cloud Computing
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Mobile Agents
◽
Detection System
◽
Computing Environment
◽
Cloud Computing Environment
◽
Distributed Intrusion Detection
◽
Distributed Intrusion Detection System
Download Full-text
Federated Identity Management (FIM): Challenges and opportunities
2015 Conference on Information Assurance and Cyber Security (CIACS)
◽
10.1109/ciacs.2015.7395570
◽
2015
◽
Cited By ~ 2
Author(s):
Ali Ahmad Malik
◽
Hirra Anwar
◽
Muhammad Awais Shibli
Keyword(s):
Identity Management
◽
Challenges And Opportunities
◽
Federated Identity Management
◽
Federated Identity
Download Full-text
Forensic examination of social networking applications on smartphones
2015 Conference on Information Assurance and Cyber Security (CIACS)
◽
10.1109/ciacs.2015.7395564
◽
2015
◽
Cited By ~ 4
Author(s):
Fazeel Ali Awan
Keyword(s):
Social Networking
◽
Forensic Examination
Download Full-text
Table of contents
2015 Conference on Information Assurance and Cyber Security (CIACS)
◽
10.1109/ciacs.2015.7395556
◽
2015
◽
Download Full-text
Challenges to network forensics in cloud computing
2015 Conference on Information Assurance and Cyber Security (CIACS)
◽
10.1109/ciacs.2015.7395562
◽
2015
◽
Cited By ~ 2
Author(s):
Nasir Raza
Keyword(s):
Cloud Computing
◽
Network Forensics
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close