InfoSec 2014 Oct. 8, 2014 to Oct. 10, 2014, kuala terengganu,malaysia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
METHOD FOR ESTIMATING UNJUST COMMUNICATION CAUSES USING NETWORK PACKETS ASSOCIATED WITH PROCESS INFORMATION Satoshi Mimura N/A
OPENING THE "PRIVATE BROWSING" DATA - ACQUIRING EVIDENCE OF BROWSING ACTIVITIES Rodrigo Ruiz N/A
A SECOND LOOK AT THE INFORMATION SECURITY AWARENESS AMONG SECONDARY SCHOOL STUDENTS Saida Issa Masoud N/A
IMPLEMENTATION OF RESOURCE DISCOVERY MECHANISMS ONTO PEERSIM Azrul Amri Jamal N/A
ANT-CBIR: A NEW METHOD FOR RADIAL FURROW EXTRACTION IN IRIS BIOMETRIC Zaheera Zainal Abidin N/A
INTEGRATED DECISION SUPPORT SYSTEM FOR HUMAN RESOURCE SELECTION USING TOPSIS BASED MODELS Kamaluddeen Magaji Doka N/A
EXTENSION AND EVALUATION OF GUIDELINE TOTAL SUPPORT SYSTEM FOR DIGITAL FORENSICS Takamichi Amano N/A
DEVELOPMENT AND TRIAL APPLICATION OF A CONTINUITY OPERATION PLAN SUPPORT SYSTEM FOR AN INFORMATION TECHNOLOGY SYSTEM Ichiro Matsunaga N/A
AUTHENTICATION USING AUDIO KEY PHRASE INTEGRATED WITH RANDOM NUMBER GENERATED KEYPAD Herny Hamid N/A
INVESTIGATION THE PERFORMANCE OF HARALICK'S TEXTURE FEATURES ON COLOR COOCCURENCE MATRIX FOR IMAGE RETRIEVAL Abd Rasid Mamat N/A
FOG COMPUTING: WILL IT BE THE FUTURE OF CLOUD COMPUTING? Osman Ghazali N/A
Cyber Defamation: A Comparative Analysis of the Legal Position in Malaysia and the United Kingdom Khairun Nisaa Asari N/A
COMPARISON OF VARIOUS VIRTUAL MACHINE DISK IMAGES PERFROMANCE ON GLUSTERFS AND CEPH RADOS BLOCK DEVICES Johanes Joseph N/A
EXAMINATION SCHEDULING SYSTEM BASED ON QUADRATIC ASSIGNMENT Danlami Muktar N/A
A CONCEPTUAL FRAMEWORK FOR DESIGNING A COMPUTER-BASED DYSLEXIA SCREENING TEST Syadiah Shamsuddin N/A
USER CENTRIC TRUSTED LOG ARCHIVAL ARCHITECTURE IN CLOUD COMPUTING ENVIRONMENTS Takashi Shitamichi N/A
DESIGNING A REAL TIME MONITORING SYSTEM FOR PASSIVE OPTICAL NETWORKS USING FIBER BRAGG GRATINGS Abdosllam Moftah Abobaker N/A
USE OF SOCIAL NETWORKS, A PATH TO TRAINING IN BLENDED LEARNING COMMUNITY Jose Lagos N/A
DEVELOPING CYBER FORENSICS FOR SCADA INDUSTRIAL CONTROL SYSTEMS Joe Stirland N/A
DESIGN OF AUTOMATED SMART GRID CIM INTEROPERABILITY TEST SYSTEM BASED ON TTCN Taein Hwang N/A
A CRITICAL ANALYSIS OF THE EFFECTIVENESS OF CYBER SECURITY DEFENSES IN UAE GOVERNMENT AGENCIES Abdulla Al Neaimi , Philip Lutaaya N/A
A STUDY OF AODV FRIENDSHIP MECHANISM IN MOBILE ADHOC NETWORK TRUST FEATURE Hatim Mohamad Tahir N/A
IS THE SECURITY BUBBLE WITHIN THE BANKING SECTOR ABOUT TO BURST? Mumina Uddin N/A