Publications 2010

 

[1] Mohammad O. Derawi, Davrondzhon Gafurov, Rasmus Larsen, Christoph Busch and Patrick Bours. Fusion of Gait and Fingerprint for User Authentication on Mobile Devices. In 2nd International Workshop on Security and Communication Networks, 2010.
[2] Mohammad O. Derawi and Rubathas Thirumathyam. Biometric Template Data Protection in Mobile Device Environment Using XML-database. In 2nd International Workshop on Security and Communication Networks, 2010.
[3] Bian Yang, Christoph Busch, Patrick Bours, and Davrondzhon Gafurov, Robust Minutiae Hash for Fingerprint Template Protection, SPIE Media Forensics and Security, Electronic Imaging, Jan.17-21, San Jose, USA, 2010.
[4] Bian Yang, Christoph Busch, and Xiamu Niu, Joint Reversible Data Hiding and Image Encryption, SPIE Media Forensics and Security, Electronic Imaging, Jan.17-21, San Jose, USA, 2010.
[5] Al-Kuwari, S., and Wolthusen, S. Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. In Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS’10) (Graz, Austria, May 2010), Springer-Verlag (accepted for publication).
[6] McEvoy, T. R. and Wolthusen, S. Host-Based Security Sensor Integrity in Multiprocessor Environments. In Proceedings of the 6th Information Security Practice and Experience Conference (ISPEC 2010) (Seoul, South Korea, May. 2010), Springer-Verlag (accepted for publication).
[7] Lunden, N. P., Sveen, R. S., Lund, H. J. K., Svendsen, N. K., and Wolthusen, S. Distributed Interactive Visualisation of Critical Infrastructure Interdependencies and Vulnerabilities in Constrained Environments. In Proceedings of the Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (Washington D.C., USA, Mar. 2010), Springer-Verlag (accepted for publication).
[8] McEvoy, T. R. and Wolthusen, S. Detecting SCADA Sensor Signal Manipulations in Nonlinear Chemical Engineering Processes. In Proceedings of the Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (Washington D.C., USA, Mar. 2010), Springer-Verlag (accepted for publication).
[9] McEvoy, T. R. and Wolthusen, S. An Algebra for Detecting and Prediction of Malicious Activity in Concurrent Systems. In Proceedings of the Fifth International Conference on Systems (ICONS 2010) (Menuieres, France, Apr. 2010), IEEE Press (accepted for publication).
[10] Seeger, M. and Wolthusen, S. Observation Mechanism and Cost Model for Tightly Coupled Asymmetric Concurrency. In Proceedings of the Fifth International Conference on Systems (ICONS 2010) (Menuieres, France, Apr. 2010), IEEE Press (accepted for publication).
[11] Al-Salloum, Z. and Wolthusen, S. Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. In Proceedings of the Fourth International ARES Workshop on Secure Software Engineering (SecSE 2010) (Krakow, Poland, Feb. 2010), IEEE Press (accepted for publication).
[12] Al-Kuwari, S., and Wolthusen, S. Forensic Tracking and Mobility Prediction in Vehicular Networks. In Proceedings of the Sixth Annual IFIP 11.9 International Conference on Digital Forensics (ICDF 2010) (Hong Kong, China, Jan. 2010), Springer-Verlag (to appear).
[13] Hai Nguyen, Katrin Franke, and Slobodan Petrovic, Improving effectiveness of intrusion detection by correlation feature selection, Proceedings of the 2010 International Conference on Availability, Reliability and Security (ARES), Krakow, Poland, February 2010, pp. 17-24.
[14] Hai Nguyen, Katrin Franke and Slobodan Petrovic, Towards a Generic Feature-Selection Measure for Intrusion Detection. In 20th International Conference on Pattern Recognition, Istanbul, Turkey, August 2010 (accepted for publication)
[15] Hai Nguyen, Slobodan Petrovic, Katrin Franke. A Comparison of Feature-Selection Methods for Intrusion Detection. In Proceedings of Fifth International Conference on Mathematical Methods, Models, and Architectures for Computer Networks Security (MMM-ACNS), St.Petersburg, Russia, September 8-11, 2010. (accepted for publication)
[16]  M. Papadopouli, A. Årnes, J. Aguado Bombin, E. Boschi, S. Buchegger, R. B. Cortiñas, F. Gaudino, G. Hogben, T. Karagiannis, C. Manifavas, K. Mitrokotsa, N. Nikiforakis, P. Papadimitratos, G. Roussos, K. Tsakona. Mobile Identity Management. By the European Network and information Security Agency (ENISA).
 [ http ]
[17] Bian Yang, Davrondzhon Gafurov, Christoph Busch, Patrick Bours. Encrypting Fingerprint Minutiae Templates by Random Quantization. Accepted to the Special Session on Real Time Biometric Solutions for Networked Society (RT-BioS 2010) at the Second International Conference on Networked Digital Technologies 2010, Prague, Czech Republic, July 7-9, 2010. (Springer-Verlag LNCS)
[18] Bian Yang, Christoph Busch, Davrondzhon Gafurov, Patrick Bours. Renewable Minutiae Templates with Tunable Size and Security. In 20th International Conference on Pattern Recognition (ICPR2010), Istanbul, Turkey, August 23-26, 2010. (IEEE press, accepted for publication)
[19] Patrick Bours and Raju Shrestha. Eigensteps: A giant leap for gait recognition. In: 2nd International Workshop on Security and Communication Networks, 2010 (accepted for publication)
[20] R. Riedmüller, M. M. Seeger, S. D. Wolthusen, H. Baier and C. Busch, Constraints on Autonomous Use of Standard GPU Components for Asynchronous Observations and Intrusion Detection, In 2nd International Workshop on Security and Communication Networks, 2010, IEEE Press (accepted for publication)
[21] Sukalpa Chanda, Katrin Franke, Umapada Pal, Structural handwritten and machine print classification for sparse content and arbitrary oriented document fragments , In Proc. ACM Symposium on Applied Computing, Document Engineering Track, Sieere, Switzerland, March 23-27, 2010, pp.18-22.
[22] Sukalpa Chanda, Katrin Franke, Umapada Pal, Tetshushi Wakabayashi, Text Independent Writer Identification for Bengali Script, In Proc. 20th Int. Conf. on Pattern recognition, (ICPR 2010), Istanbul, Turkey. (to appear)
[23] Sukalpa Chanda, Umapada Pal, Katrin Franke, Fumitaka Kimura, Script identification – A Han & Roman Script Perspective, In Proc. 20th Int. Conf. on Pattern recognition, (ICPR 2010), Istanbul, Turkey. (to appear)
[24] Davrondzhon Gafurov, Christoph Busch, Patrick Bours and Bian Yang, "Fusion in Fingerprint Authentication: Two Finger Scenarios", International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, IEEE Press, Special Session on Privacy and Security in Biometrics, Darmstadt, Germany, October 15-17, 2010 (accepted for publication).
[25] Davrondzhon Gafurov, Bian Yang, Patrick Bours and Christoph Busch, "Independent Performance Evaluation of Fingerprint Verification at the Minutiae and Pseudonymous Identifier Levels", IEEE International Conference on Systems, Man, and Cybernetics (SMC), Istanbul,Turkey, October 10-13, 2010 (accepted for publication).
[26]  Mohammad O. Derawi, Claudia Nickel, Patrick Bours and Christoph Busch, "Unobtrusive User-Authentication on Mobile Phones using Biometric Gait
 Recognition”, International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, IEEE Press, Special Session on Advances in Biometrics, Darmstadt, Germany, October 15-17, 2010 (accepted for publication).
[27] Mohammad O. Derawi, Patrick Bours and Kjetil Holien, "Improved Cycle Detection for Accelerometer Based Gait Authentication”, International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, IEEE Press, Special Session on Advances in Biometrics, Darmstadt, Germany, October 15-17, 2010 (Best Paper Award).
[28] Davrondzhon Gafurov, Einar Snekkenes and Patrick Bours, Improved Gait Recognition Performance Using Cycle Matching, International Conference on Advanced Information Networking and Applications, Perth, Australia, 20-23 April 2010, IEEE
[29] Davrondzhon Gafurov, Janne Hagen and Einar Snekkenes, Temporal Characteristics of Gait Biometrics, International Conference on Computer Engineering and Applications (ICCEA), Bali Island, Indonesia, March 19-21, 2010, IEEE.
[30] Davrondzhon Gafurov, Patrick Bours, Bian Yang and Christoph Busch, GUC100 Multi-scanner Fingerprint Database for In-House (Semi-Public) Performance and Interoperability Evaluation, International Conference on Computational Science and Its Applications (ICCSA), Fukuoka, Japan, March 23-26, 2010, IEEE.
[31] Davrondzhon Gafurov, Bian Yang, Patrick Bours and Christoph Busch, Independent Performance Evaluation of Biometric Systems, International Biometric Performance Testing Conference, National Institute of Standards and Technology (NIST), Gaithersburg, USA, March 2-4, 2010.
[32] T. Vold, S. Yildirim, N. Ree-Lindstad, F. Souami. Enhanced Learning Outcome Using Participative Role Play Simulation, ITHET10, Cappadocia, Turkey, 28 April–1 May.
[33] Sule Yildirim. Serious Game Design for Military Training, Games: Design and Research Conference, Volda University College, June 3-4, 2010
[34] Yildirim S. and Stene, Sindre B. A Survey on the Need and Use of AI in Game Agents, Modelling, Simulation and Optimization, ISBN 978-953-7619-36-7.
[35] Bian Yang, Koen Simoens, Christoph Busch. "Security Enhanced Random Projection to Protect Biometric Templates," Workshop on Pattern Recognition for IT Security at the 32nd Annual Symposium of the German Association for Pattern Recognition. Darmstadt, Sept.21-24, 2010.
[36] Bian Yang, Daniel Hartung, Koen Simoens, Christoph Busch. "Dynamic Random Projection for Biometric Template Protection," IEEE Fourth International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2010). Washington DC, Sept.27-29, 2010. (IEEE Press)
[37] Hai Thanh Nguyen and Slobodan Petrovic. An Operational Research Approach to Feature Selection for Network-based Intrusion Detection. In Proceedings of the Conference on Cryptology and Information Security (RECSI), Tarragona, Spain, 7-10 September, 2010.
[38] Davrondzhon Gafurov, Patrick Bours, Bian Yang and Christoph Busch, “GUC100 Multisensor Fingerprint Database for in-House (Semipublic) Performance Test”, EURASIP Journal on Information Security, 2010.
[39] Davrondzhon Gafurov, Bian Yang, Patrick Bours and Christoph Busch, “Impact of Finger Type in Fingerprint Authentication”, International Conference on Security Technology (SecTech 2010) , Springer LNCS, Jeju Island, Korea, December 13-15, 2010.
[40] Davrondzhon Gafurov, “Emerging Biometric Modalities: Challenges and Opportunities”, International Conference on Security Technology (SecTech 2010), Springer LNCS, Jeju Island, Korea, December 13-15, 2010.
[41] Davrondzhon Gafurov and Patrick Bours, “Improved Hip-based Individual Recognition Using Wearable Motion Recording Sensor” ”, International Conference on Security Technology (SecTech 2010) , Springer LNCS, Jeju Island, Korea, December 13-15, 2010.
[42] Erik Hjelmås (editor). Norsk Informatikkonferanse (NIK 2010), Tapir akademisk forlag, Trondheim, 2010.
[43] Knut Wold and Slobodan Petrovic. Robustness of TRNG against Attacks that Employ Superimposing Signal on FPGA Supply Voltage. In Proceedings of Norwegian Information Security Conference (Norsk Informasjonssikkerhetskonferanse) NISK 2010, pp. 81-92, Tapir Akademisk Forlag, 2010.
[44] Geir Olav Dyrkolbotn, Knut Wold and Einar Snekkenes. "Security Implications of Crosstalk in Switching CMOS Gates". 13th Information Security Conference (ISC 2010), Boca Raton, Florida, October 25-28 2010, LNCS 6531.
[45] Geir Olav Dyrkolbotn. "Non-Invasive Reverse Engineering of the Relative Position of Bus Wires". In Proceedings of Norwegian Information Security Conference (Norsk Informasjonssikkerhetskonferanse) NISK 2010, pp. 104-109, Tapir Akademisk Forlag, 2010.
[46] Mohammad Omar Derawi. Accelerometer-Based Gait Analysis, A survey. In Proceedings of Norwegian Information Security Conference (Norsk Informasjonssikkerhetskonferanse) NISK 2010, pp. 33-44, Tapir Akademisk Forlag, 2010.
[47] Jan Hirzel, Daniel Hartung, Christoph Busch: "Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets", in Proceedings BIOSIG 2010, pages 109-115
[48] S. Abt, C. Busch, C. Nickel: "Applikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien", in Proceedings BIOSIG 2010, pages 95-106
[49] Daniel Hartung, Christoph Busch: "Biometric Transaction Authentication Protocol", in Proceedings of the IEEE Securware conference, July
[50] Christoph Busch, Daniel Hartung: "Biometrische Nachrichten-Authentisierung“, in Proceedings of the GI-Sicherheit 2010, pages 13-24
[51] Martin Olsen, Daniel Hartung, Christoph Busch, Rasmus Larsen: "Contrast Enhancement and Metrics for Biometric Vein Pattern Recognition“, in Proceedings of ICIC 2010
[52] Chanda, S., Franke, K., Pal, U. (2010). "Document-Zone Classification in Torn Documents", Proc. Intern. Conference Frontiers in Handwriting Recognition, 2010. IEEE Computer Society Press. PhDstudent Sukalpa Chanda is honored with the IAPR* Best student paper Award. (* International Association of Pattern Recognition).
[53] Houten, von, H., Geradts, Z., Franke, K., Veenman, C. (2010). Verification of Video Source Camera Competition (CAMCOM 2010). In Recognizing Patterns in Signals, Speech, Images and Video: ICPR 2010 Contests, Springer LNCS 6388, pp. 22-28.