2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)

11-14 Dec. 2017

Filter Results

Displaying Results 1 - 25 of 136
  • [Front cover]

    Publication Year: 2017, Page(s): 1
    Request permission for reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): 2
    Request permission for reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Message from the steering committee

    Publication Year: 2017, Page(s): 1
    Request permission for reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Contents page

    Publication Year: 2017, Page(s):4 - 11
    Request permission for reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • ICITST-2017 programme committees

    Publication Year: 2017, Page(s):12 - 13
    Request permission for reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2017, Page(s): 14
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote speaker 1: Cyber-resilient ICS through diversified redundancy and intrusion detection

    Publication Year: 2017, Page(s): 15
    Request permission for reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Keynote speaker 2: Participatory self-management systems for resilient smart cities

    Publication Year: 2017, Page(s): 16
    Request permission for reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Keynote speaker 3: Looking after our IP in supply chain

    Publication Year: 2017, Page(s): 17
    Request permission for reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Keynote speaker 4: Cloud forensics

    Publication Year: 2017, Page(s): 18
    Request permission for reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Keynote speaker 5: Taming security technology

    Publication Year: 2017, Page(s): 19
    Request permission for reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Keynote speaker 6: Steel made in Europe: The backbone of sustainability

    Publication Year: 2017, Page(s): 20
    Request permission for reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Workshops

    Publication Year: 2017, Page(s): 21
    Request permission for reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Workshop 1: Chaos-based data protection, data security and hiding in multimedia communications (CDP-DSHMC 2017)

    Publication Year: 2017, Page(s): 22
    Request permission for reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • RARE: A robust algorithm for rapid encryption

    Publication Year: 2017, Page(s):23 - 28
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    Regarding the intensive use of images in the context of IoT, their security becomes crucial. Despite that severals lightweight ciphers have been proposed, they are not suitable for images data due to their features such as correlation, redundancy and voluminosity. In this context, we treat in this paper the weaknesses of the existent lightweight ciphers concerning the constraints of images. Additi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LSB-hamming based chaotic steganography (LH-Steg)

    Publication Year: 2017, Page(s):29 - 34
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    This work introduces a novel secret-key spatial steganographic approach based on Hamming codes and LSB embedding. The embedding artifacts are restricted to rich textured zones of the cover image. We exploited the standard deviation measurement to select potential candidate block of pixels to hold the secret message. In the aim of ensuring the security aspect of our proposed method, we use the Skew... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New keyed chaotic neural network hash function based on sponge construction

    Publication Year: 2017, Page(s):35 - 38
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (669 KB) | HTML iconHTML

    This paper presents a new structure for keyed hash function based on chaotic maps, neural network and sponge construction. The structure of proposed Keyed Sponge Chaotic Neural Network KSCNN hash function is composed of three phases: the initialization phase pads the message M and divides it into q message blocks M<sub>i</sub> of fixed size r, the absorbing phase hashes the message blo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information

    Publication Year: 2017, Page(s):39 - 42
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    The aim of the paper is to reveal false names of accounts as a result of hackers attacks. The probability a given account to be either false or actual is calculated using methods for machine learning analysis. The suspected account will be used as a pattern and by classification techniques clusters will be formed with a respective probability this name to be false. The purpose of investigation is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight signcryption scheme based on discrete Chebyshev maps

    Publication Year: 2017, Page(s):43 - 47
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (811 KB) | HTML iconHTML

    Signcryption schemes are cryptographic mechanisms providing both encryption and signing in a very efficient way. This paper presents a lightweight signcryption scheme based on Chebyshev chaotic maps over finite fields. For that, complex dynamic properties of the Chebyshev map are investigated and shown to be adequate for the construction of a signcryption scheme. The proposed signcryption scheme i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop: The 8th international workshop on cloud applications and security (CAS'17)

    Publication Year: 2017, Page(s): 48
    Request permission for reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Forward secure searchable symmetric encryption

    Publication Year: 2017, Page(s):49 - 54
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Data outsourcing to third party clouds poses numerous data security threats. Access by unauthorized users is one of the security threat to the outsourced data. Unauthorized access can be avoided by encrypting the data before outsourcing. However, encrypting data before outsourcing renders it unsearchable to the data owner. Searchable encryption schemes are developed to specifically target this pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models

    Publication Year: 2017, Page(s):55 - 60
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    The advent of Data Science has led to data being evermore useful for an increasing number of organizations who want to extract knowledge from it for financial and research purposes. This has triggered data to be mined at an even faster pace causing the rise of Data Centers that host over thousands of machines together with thousands of jobs running in each of those machines. The growing complexiti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An advanced reinforcement learning approach for energy-aware virtual machine consolidation in cloud data centers

    Publication Year: 2017, Page(s):61 - 66
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    Energy awareness presents an immense challenge for cloud computing infrastructure and the development of next generation data centers. Inefficient resource utilization is one of the greatest causes of energy consumption in data center operations. To address this problem we introduce an Advanced Reinforcement Learning Consolidation Agent (ARLCA) capable of optimizing the distribution of virtual mac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting host CPU utilization in cloud computing using recurrent neural networks

    Publication Year: 2017, Page(s):67 - 72
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    One of the major challenges facing cloud computing is to accurately predict future resource usage for future demands. Cloud resource consumption is constantly changing, which makes it difficult for forecasting algorithms to produce accurate predictions. This motivates the research presented in this paper which aims to predict host machines CPU consumption for a single time-step and multiple time-s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sessions

    Publication Year: 2017, Page(s): 73
    Request permission for reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE