default search action
CCC 2016: Amman, Jordan
- Cybersecurity and Cyberforensics Conference, CCC 2016, Amman, Jordan, August 2-4, 2016. IEEE 2016, ISBN 978-1-5090-2657-9
Session 1
- Malek Al-Zewairi, Dima Suleiman, Adnan Shaout:
Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System. 1-7 - Umar Mukhtar Ismail, Syed Islam, Shareeful Islam:
Towards Cloud Security Monitoring: A Case Study. 8-14 - Asma Salem, Dema Zaidan, Andraws I. Swidan, Ramzi R. Saifan:
Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices. 15-21 - Mariam Khader, Ali Hadi, Amjad Hudaib:
Covert Communication Using Port Knocking. 22-27 - Maha Saadeh, Azzam Sleit, Mohammed Qatawneh, Wesam Almobaideen:
Authentication Techniques for the Internet of Things: A Survey. 28-34
Session 2
- Nadia Benchikha, Mohamed Krim, Khaled Zeraoulia, Chafika Benzaid:
IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework. 35-40 - Akram Barakat, Ali Hadi:
Windows Forensic Investigations Using PowerForensics Tool. 41-47 - Khulood Ali Al Zaabi:
Android Forensics: Investigating Social Networking Cybercrimes against Man-in-the-Middle Attacks. 48-54 - Esra'a Alshammary, Ali Hadi:
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files. 55-59
Session 3
- Aisha Zaid, Ja'far Alqatawna, Ammar Huneiti:
A Proposed Model for Malicious Spam Detection in Email Systems of Educational Institutes. 60-64 - Ja'far Alqatawna, Ali Hadi, Malek Al-Zewairi, Mariam Khader:
A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes. 65-69 - Mohannad Alhanahnah, David W. Chadwick:
Boosting Usability for Protecting Online Banking Applications Against APTs. 70-76 - Chris Moore:
Detecting Ransomware with Honeypot Techniques. 77-81
Session 4
- Rola Al Halaseh, Ja'far Alqatawna:
Analyzing CyberCrimes Strategies: The Case of Phishing Attack. 82-88 - Nazeeh Ghatasheh:
Fraud Prevention Framework for Electronic Business Environments: Automatic Segregation of Online Phishing Attempts. 89-95 - Wedyan Alswiti, Ja'far Alqatawna, Bashar Al-Shboul, Hossam Faris, Heba Hakh:
Users Profiling Using Clickstream Data Analysis and Classification. 96-99 - Julian Droogan, Lise Waldek:
Where are All the Cyber Terrorists? From Waiting for Cyber Attack to Understanding Audiences. 100-106
Session 5
- Fathiya Al Izki, George R. S. Weir:
Management Attitudes toward Information Security in Omani Public Sector Organisations. 107-112 - Izzat Alsmadi, Iyad Alazzam:
Websites' Input Validation and Input-Misuse-Based Attacks. 113-116 - MingJian Tang, Mamoun Alazab, Yuxiu Luo:
Exploiting Vulnerability Disclosures: Statistical Framework and Case Study. 117-122 - Mohammad Qbea'h, Mohammad Aref Alshraideh, Khair Eddin Sabri:
Detecting and Preventing SQL Injection Attacks: A Formal Approach. 123-129 - John Oluwole Babatunde:
Experimental and Analytical Evaluation of the Impact of Security Compliance on System Performance of Web Applications. 130-136 - Karen Renaud, George R. S. Weir:
Cybersecurity and the Unbearability of Uncertainty. 137-143 - Andreas Assmuth, Paul Cockshott, Jana Kipke, Karen Renaud, Lewis Mackenzie, Wim Vanderbauwhede, Matthias Söllner, Tilo Fischer, George R. S. Weir:
Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors. 144-150
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.