SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The International Conference on Computing Technology, Information Security and Risk Management (CTISRM2016)
-
Remote Sensing Water Information Extraction Based on Neural Network Sensitivity Analysis
Characteristics of each image or differences in the surrounding environment will cause the imaging of characteristics cannot keep necessarily balance. So, to avoid the difference caused by using a ...Authors: Chen Ping, Yanrong Wu, Da Sha, Congcong Zhang and Chen Qi
Year Published: Mar. 2016 | 1-6 | CTISRM2016 -
Mobile Security for Banking on Android Platform
This paper discusses the proposal of protecting mobile banking applications on an Android platform. The mobile platform surpasses computers in its popularity in many aspects of ones daily routine. ...Authors: Lukas Aron, Petr Hanacek
Year Published: Mar. 2016 | 7-13 | CTISRM2016 -
An Automated Tool for Measuring Lumbar Spinal Canal Diameter
In this paper, an automated software tool for measuring the diameter of lumbar spinal canal is designed, implemented, and tested. The value of the diameter is used in the diagnosis of Lumbar Spinal ...Authors: Raed M. Bani-Hani, Momen M. Oqaily, Hamzeh Y. Al-Okaily, Reem M. Al-Rashdan and Noor M. Shboul
Year Published: Mar. 2016 | 14-18 | CTISRM2016 -
Firmware Update Trend in the Internet of Things -An Empirical Survey of Japanese HGW Vendors-
Firmware vulnerability is a serious concern in the Internet of Things (IoT) environment. Home Gateway (HGW) is a small router that connects the home network to the Internet. Malicious hackers attack ...Authors: Ichiro Mizukoshi, Aki Nakanishi and Atsuhiro Goto
Year Published: Mar. 2016 | 19-29 | CTISRM2016 -
Smart Technologies for e-Surveillance: Some Positives but also Problems Regarding Security, Privacy and Protection of Personal Data
The paper is dealing with application of the above smart technologies in the area of e-Surveillance and in this respect as a result of so far achieved results in our ongoing research under the EU ...Authors: Dusan Soltes
Year Published: Mar. 2016 | 30-37 | CTISRM2016 -
Application of Combined Evaluation Method Based on Comprehensive Weight and Gray-fuzzy Theory in Network Security Risk Assessment
With the rapid development of network information technology, the corresponding security problem is increasingly serious. It is the primary issue to carry out network security risk assessment that ...Authors: Zhipeng Li, Zhijie Li, Yongjun Shen and Guidong Zhang
Year Published: Mar. 2016 | 38-46 | CTISRM2016 -
Social Media Investigations Using Shared Photos
In recent years, social networks (SNs) have revolutionized many aspects of society. The wide variety of available platforms meets almost every kind of users’ needs: socialization, professional ...Authors: Danilo Montesi, Flavio Bertini, Rajesh Sharma and Andrea Ianni
Year Published: Mar. 2016 | 47-60 | CTISRM2016 -
Protection of National Cyber Security: Awareness & Education
It is identified that one of the greatest threats against security in the next coming ten years will be cold cyber wars against information systems between countries. National information systems ...Authors: Mehmet Tekerek, Yilmaz Vural and Murat Aydos
Year Published: Mar. 2016 | 61-66 | CTISRM2016