CS & IT
Conference Proceedings
menu
Home
Current issue
Archives
Contact
search
CS&IT Conference Proceedings
Home
Current issue
Archives
Contact
search
Search
×
search
keyboard_arrow_up
Volume 8, Number 18, December 2018
5
th
International Conference on Computer Science, Engineering and Information Technology (CSEIT-2018), December 22-23, 2018, Dubai, UAE
Volume Editors : Dhinaharan Nagamalai, Jan Zizka
ISBN : 978-1-921987-96-0
Android Untrusted Detection with Permission Based Scoring Analysis
Jackelou Sulapas Mapa, Saint Joseph Institute of Technology, Philippines
An Ontology Based Hierarchical Bayesian Network Classification Model to Predict The Effect of DNA Repairs Genes in Human Ageing Process
Hasanein Alharbi, Al-Mustaqbal University College, Iraq
Fuzzy Boolean Reasoning for Diagnosis of Diabetes
Mohamed Benamina, Baghdad Atmani and Sofia Benbelkacem, University of Oran 1 Ahmed Ben Bella, Algeria
Virtual AIS Generation Management System for Waterway Risk Assessment
Jun Sik Kim
1
, Seung Wook Hong
2
and Suhyun Park
1
,
1
Dongseo University, Korea and
2
ONE Data Technology, Korea
Data Management Platform Supporting Volunteer Occupation Services
Damien Nicolas, Adnan Emeri, Marie Laure Watrinet and Djamel Khadraoui, LIST: Luxembourg Institute of Science and Technology, Luxembourg
Camouflaged with Size: A Case Study of Espionage Using Acquirable Single Board Computers
Kiavash Satvat
1
, Mahshid Hosseini
1
and Maliheh Shirvanian
2
,
1
University of Illinois at Chicago, USA and
2
University of Alabama at Birmingham, USA
Predicting Security Critical Conditions of Cyber Physical Systems with Unobservables and Observation Times
Alessio Coletta
1,2
,
1
Bruno Kessler Foundation, Italy and
2
University of Trento, Italy
Secure Strategy for Optical Image Encryption System Based on Amplitude Modulation, Phase Modulation and Modified Logistic Map
Ahmed M. Elshamy
1
, Aziza I. Hussein
2,3
, Hesham F. A. Hamed
2
, M. A.Abdelghany
2
and Hamdy M. Kelash
4
,
1
Fujairah University, UAE,
2
Minia University, Egypt,
3
Effat University, KSA and
4
Menoufia University, Egypt
An Elastic Hybrid Honeynet for Cloud Environment
Nguyen Khac Bao, Sung Won Ahn and Minho Park, Soongsil University, Korea
A Machine Learning Approach to Detect and Classify 3D Two-Photon Polymerization Microstructures Using Optical Microscopy Images
Israel Goytom and Gu Yinwei, Ningbo University, China
Video Sequencing Based Facial Expression Detection with 3D Local Binary Pattern Variants
Kennedy Chengeta
1
and Serestina Viriri
2
,
1
University of KwaZulu Natal, South Africa and
2
Westville Campus, South Africa
Near-Drowning Early Prediction Technique Using Novel Equations (NEPTUNE) for Swimming Pools
B David Prakash, IAG Firemark, Singapore
A Preferment Platform for Implementing Security Mechanism for Automotive Can Bus
Mabrouka Gmiden, Mohamed Hedi Gmiden and Hafedh Gmiden, National Engineers School of Sfax-Tunisia
Randomized Dynamic Trickle Timer Algorithm for Internet of Things
Muneer Bani Yassein, Ansam Alnadi and Asmaa Bataineh, Jordan University of Science and Technology, Jordan
Black Hole Attack Security Issues, Challenges & Solution in MANET
Muneer Bani Yassein, Ismail Hmeidi, Yaser Khamayseh Mohammad Al-Rousan and Danah Arrabi, University of Science and Technology, Jordan
Security Protocol for Pollution Attack Using Network Coding
Kiattikul Sooksomsatarn, University of Phayao, Thailand
settings
Editorial Board
book
Most Cited Articels
list
Indexing
help
FAQ