416 Hits in 5.6 sec

Impact of duty cycle protocols on security cost of IoT

Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve
2018 2018 9th International Conference on Information and Communication Systems (ICICS)  
It begins by evaluating the cost of security on a per-packet basis, and then evaluates how duty cycle protocols could affect security cost.  ...  This research studies the impact of duty cycle protocols on security cost in IoT embedded devices.  ...  PowerTracker can present a detailed information on the total time the radio spends in active, receiving and transmitting modes.  ... 
doi:10.1109/iacs.2018.8355436 fatcat:7kvqvqicgvfvhbs7mnn3euewta

Efficient joint encryption and data hiding algorithm for medical images security

Hiba Abdel-Nabi, Ali Al-Haj
2017 2017 8th International Conference on Information and Communication Systems (ICICS)  
The proposed algorithm uses standard encryption methods and reversible watermarking techniques to provide security to the transmitted medical images as well as to control access privileges at the receiver  ...  In this paper an efficient crypto-watermarking algorithm is proposed to secure medical images transmitted in tele-medicine applications.  ...  Conference on Information and Communication Systems (ICICS) 978-1-5090-4243-2/17/$31.00 ©2017 IEEE 8th International Conference on Information and Communication Systems (ICICS)  ... 
doi:10.1109/iacs.2017.7921962 fatcat:qmw7y2n4gjhwpll44kxexskbsq

Downlink femto-macro ICIC with location-based long-term power setting

Julien Guillet, Loic Brunel, Nicolas Gresset
2012 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)  
Efficient macro-femto inter-cell interference coordination (ICIC) is crucial and should be performed with minimum communication between macro and femto base stations.  ...  server and configures its transmission power according to this information.  ...  and ICIC Loc., respectively).  ... 
doi:10.1109/camad.2012.6335332 dblp:conf/camad/GuilletBG12 fatcat:yew74mwuhjb2vls32btcwgmtcy

Table of Contents

2021 2021 12th International Conference on Information and Communication Systems (ICICS)  
Typification of the demand-generation relationship of Colombian electricity market and forecast of demand at an hourly-daily level based on consumption patternsLilian D.  ...  on deep learning methods for explainable recommendations with reviews Hafed Zarzour , Bashar Al shboul, Mahmoud Al-Ayyoub, Yaser Jararweh Mowjaz Multi-topic Labelling Task Sefamerve R&D at ICICS 2021  ... 
doi:10.1109/icics52457.2021.9464562 fatcat:ud4flglyqvetrehhkka7thflea

Table of Content

2020 2020 Fifth International Conference on Informatics and Computing (ICIC)  
SVM 11 Muhammad Alkaff, Andreyan Rizky Baskara, Yohanes Hendro Wicaksono 68-73 Health Information Adoption Influencing Factors in Social Online Community 12 Ave Adriana Pinem, Achmad Nizar Hidayanto  ...  Information Security Risk Management Planning of Digital Certificate Management Case Study: Balai Sertifikasi Elektronik 98 Dana Indra Sensuse, Andy Syahrizal, Faizan Aditya, Muhammad Nazri 691-698 PenalViz  ... 
doi:10.1109/icic50835.2020.9288620 fatcat:vx6onvgd7bfvliyy6ropmis6si

A proposal for securing communications over ATM networks

X. Yi, K.Y. Lam, Y.F. Han, Y. Gong
Proceedings of ICICS, 1997 International Conference on Information, Communications and Signal Processing. Theme: Trends in Information Systems Engineering and Wireless Multimedia Communications (Cat. No.97TH8237)  
In this paper, we come up with a new p roposal for securing communications over ATM networks, which initially relies on DSA.  ...  In February 1999, the ATM forum international consortium approved the first version of its security specifications, aiming to protect communications over Asynchronous Transfer Mode (ATM) networks by offering  ...  In February 1999, the ATM forum international consortium approved the first version of its security specifications [13] that is available on the Forum's web site:  ... 
doi:10.1109/icics.1997.652053 fatcat:tr4yc2g4j5esbcmuf6q5nktbzm

Cultural differences across governmental website design

Nitesh Goyal, William Miner, Nikhil Nawathe
2012 Proceedings of the 4th international conference on Intercultural Collaboration - ICIC '12  
and India and finally, focus more on the differences between China and US.  ...  In this paper, we study the relevance of Hall and Hofstede's works to the web design beyond traditional domain areas like e-commerce, and advertising.  ...  ACKNOWLEDGEMENTS We would like to thank Gilly Leshed and Eric Baumer for their constant guidance and help with editing previous versions.  ... 
doi:10.1145/2160881.2160907 fatcat:aucv7mbxzvetpfktkjegeuwemm

Botnet: Survey and Case Study

Chao Li, Wei Jiang, Xin Zou
2009 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)  
We discuss in detail the botnet and related research including infection mechanism, botnet malicious behavior, command and control models, communication protocols, botnet detection, and botnet defense.  ...  Although botnets are widespread development, the research and solutions for botnets are not mature. In this paper, we present an overview of research on botnets.  ...  Bothunter [24] modeled the bot infection phase as a set of ordered communication flows that are exchanged between an internal host and external entities and used this model to compare suspected infection  ... 
doi:10.1109/icicic.2009.127 fatcat:4sz5ygcz7regnghwxmcjkf6r5y

Importance of service integration in e-government implementations

Asa'd M. As'ad, Babak Khazaei, Babak Akhgar, Ja'far Alqatawna
2016 2016 7th International Conference on Information and Communication Systems (ICICS)  
and the last is confidentiality and security of personal information.  ...  The first stage is publishing where governments provide information to citizens through static web pages (one way communication), and the second stage is transaction where government exchange information  ... 
doi:10.1109/iacs.2016.7476086 fatcat:ydqmcgfdpbapja767hd2kzxsle

Combining cryptographic primitives to prevent jamming attacks in wireless networks

N. H. Singh, A. Kayalvizhi
2013 2013 International Conference on Information Communication and Embedded Systems (ICICES)  
However, adversaries with internal knowledge of protocol specification and network secrets can launch low-effort jamming attacks that are difficult to detect and counter.  ...  Random key distribution methods are done along with three schemes to give more secured packet transmission in wireless networks.  ...  The advantage of the puzzle-based scheme is that its security does not rely on the PHY-layer parameters. However, it has higher computation and communication overheads.  ... 
doi:10.1109/icices.2013.6508220 fatcat:knlwcbtwazhqjhmpfw3xuoie5q

The Latest Adoption Blockchain Technology in Supply Chain Management: A Systematic Literature Review

Surjandy, Meyliana, Achmad Nizar Hidayanto, Harjanto Prabowo
2019 ICIC Express Letters  
At a closer look, the research tries to elaborate on essential factors of Blockchain adoption in SCM. The research methodology used a Systematic Literature Review (SLR).  ...  Therefore, the aim and novelty of this study become a preliminary point for future research of adoption Blockchain technology in SCM.  ...  The 28th DAAAM International Symposium on Intelligent Man-ufacturing and Automation 1 2.5% Conference The 37th International Conference on Distributed Computing Systems Workshops 1 2.5% Conference The  ... 
doi:10.24507/icicel.13.10.913 fatcat:ibqrwn5sbbdutiekyuiwb7pzmq

Sentiment analysis for dialectical Arabic

Rehab M. Duwairi
2015 2015 6th International Conference on Information and Communication Systems (ICICS)  
Dialectical Arabic is abundantly present in social media and micro blogging channels. Dialectical Arabic presents challenges for topical classifications and for sentiment analysis.  ...  Sentiment analysis has many applications and is very vital for many organizations.  ...  and Communication Systems (ICICS) 6th International Conference on Information and Communication Systems (ICICS)  ... 
doi:10.1109/iacs.2015.7103221 fatcat:nsjf6fm6rbefjnk2g6l2txr4qi

Performance enhancement of power line communication

A. Goyal, S. K. Patra
2013 2013 International Conference on Information Communication and Embedded Systems (ICICES)  
one of the best candidate, however in case of interfacing between wired and wireless communication (as required in case of long haul communication and power failure) CDMA could prove to be a more useful  ...  one.  ...  operation which is usually a one way communication.  ... 
doi:10.1109/icices.2013.6508338 fatcat:vfq6yjgkwnac3bqreqoy2z7wrq

A wavelet based image watermarking technique using image sharing method

B. Sridhar, C. Arun
2013 2013 International Conference on Information Communication and Embedded Systems (ICICES)  
The original image is diagonally shared and one of the shares is horizontally merged and watermarking process is employed in fusion image using wavelet.  ...  Recent advancement in communication technology protection of digital data is a severe problem.  ...  Step 5 Secret image is multiplied with a weighting function and it is added to the subband information.  ... 
doi:10.1109/icices.2013.6508179 fatcat:w67ybfmovbbqnd5xmfodgtfb7y

Defense against impersonating attackers: An efficient RFID mutual authentication protocol based on standard

Shiqi Wang, Linsen Li, Gaosheng Chen, Tao Chen, Zeming Wang
2017 2017 8th International Conference on Information and Communication Systems (ICICS)  
After scrutiny, we found out that these vulnerabilities lie in the insufficient protections of random numbers, and we reconstruct the request and response based on the original protocol by making message  ...  The security of our protocol, proved by Ban logic analysis, is ensured by double protections-secret key pairs and dynamic random numbers.  ...  Conference on Information and Communication Systems (ICICS)  ... 
doi:10.1109/iacs.2017.7921977 fatcat:yro4jndgtvfvffxuewnygsxlzu
« Previous Showing results 1 — 15 out of 416 results