


default search action
CCC 2016: Amman, Jordan
- Cybersecurity and Cyberforensics Conference, CCC 2016, Amman, Jordan, August 2-4, 2016. IEEE 2016, ISBN 978-1-5090-2657-9

Session 1
- Malek Al-Zewairi

, Dima Suleiman, Adnan Shaout
:
Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System. 1-7 - Umar Mukhtar Ismail, Syed Islam, Shareeful Islam:

Towards Cloud Security Monitoring: A Case Study. 8-14 - Asma Salem, Dema Zaidan, Andraws I. Swidan, Ramzi R. Saifan:

Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices. 15-21 - Mariam Khader, Ali Hadi, Amjad Hudaib:

Covert Communication Using Port Knocking. 22-27 - Maha Saadeh

, Azzam Sleit
, Mohammed Qatawneh, Wesam Almobaideen
:
Authentication Techniques for the Internet of Things: A Survey. 28-34
Session 2
- Nadia Benchikha, Mohamed Krim, Khaled Zeraoulia, Chafika Benzaid

:
IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework. 35-40 - Akram Barakat, Ali Hadi:

Windows Forensic Investigations Using PowerForensics Tool. 41-47 - Khulood Ali Al Zaabi:

Android Forensics: Investigating Social Networking Cybercrimes against Man-in-the-Middle Attacks. 48-54 - Esra'a Alshammary, Ali Hadi:

Reviewing and Evaluating Existing File Carving Techniques for JPEG Files. 55-59
Session 3
- Aisha Zaid

, Ja'far Alqatawna, Ammar Huneiti:
A Proposed Model for Malicious Spam Detection in Email Systems of Educational Institutes. 60-64 - Ja'far Alqatawna, Ali Hadi, Malek Al-Zewairi

, Mariam Khader:
A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes. 65-69 - Mohannad Alhanahnah, David W. Chadwick

:
Boosting Usability for Protecting Online Banking Applications Against APTs. 70-76 - Chris Moore

:
Detecting Ransomware with Honeypot Techniques. 77-81
Session 4
- Rola Al Halaseh, Ja'far Alqatawna:

Analyzing CyberCrimes Strategies: The Case of Phishing Attack. 82-88 - Nazeeh Ghatasheh

:
Fraud Prevention Framework for Electronic Business Environments: Automatic Segregation of Online Phishing Attempts. 89-95 - Wedyan Alswiti, Ja'far Alqatawna, Bashar Al-Shboul

, Hossam Faris, Heba Hakh:
Users Profiling Using Clickstream Data Analysis and Classification. 96-99 - Julian Droogan

, Lise Waldek
:
Where are All the Cyber Terrorists? From Waiting for Cyber Attack to Understanding Audiences. 100-106
Session 5
- Fathiya Al Izki, George R. S. Weir:

Management Attitudes toward Information Security in Omani Public Sector Organisations. 107-112 - Izzat Alsmadi, Iyad Alazzam

:
Websites' Input Validation and Input-Misuse-Based Attacks. 113-116 - MingJian Tang, Mamoun Alazab

, Yuxiu Luo:
Exploiting Vulnerability Disclosures: Statistical Framework and Case Study. 117-122 - Mohammad Qbea'h

, Mohammad Aref Alshraideh
, Khair Eddin Sabri:
Detecting and Preventing SQL Injection Attacks: A Formal Approach. 123-129 - John Oluwole Babatunde:

Experimental and Analytical Evaluation of the Impact of Security Compliance on System Performance of Web Applications. 130-136 - Karen Renaud

, George R. S. Weir:
Cybersecurity and the Unbearability of Uncertainty. 137-143 - Andreas Assmuth

, Paul Cockshott, Jana Kipke, Karen Renaud, Lewis Mackenzie, Wim Vanderbauwhede, Matthias Söllner, Tilo Fischer, George R. S. Weir:
Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors. 144-150

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














