CCC A

25 papers

YearTitle / Authors
2016A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes.
Ja'far Alqatawna, Ali Hadi, Malek Al-Zewairi, Mariam Khader
2016A Proposed Model for Malicious Spam Detection in Email Systems of Educational Institutes.
Aisha Zaid, Ja'far Alqatawna, Ammar Huneiti
2016Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices.
Asma Salem, Dema Zaidan, Andraws I. Swidan, Ramzi R. Saifan
2016Analyzing CyberCrimes Strategies: The Case of Phishing Attack.
Rola Al Halaseh, Ja'far Alqatawna
2016Android Forensics: Investigating Social Networking Cybercrimes against Man-in-the-Middle Attacks.
Khulood Ali Al Zaabi
2016Authentication Techniques for the Internet of Things: A Survey.
Maha Saadeh, Azzam Sleit, Mohammed Qatawneh, Wesam Almobaideen
2016Boosting Usability for Protecting Online Banking Applications Against APTs.
Mohannad Alhanahnah, David W. Chadwick
2016Covert Communication Using Port Knocking.
Mariam Khader, Ali Hadi, Amjad Hudaib
2016Cybersecurity and Cyberforensics Conference, CCC 2016, Amman, Jordan, August 2-4, 2016
2016Cybersecurity and the Unbearability of Uncertainty.
Karen Renaud, George R. S. Weir
2016Detecting Ransomware with Honeypot Techniques.
Chris Moore
2016Detecting and Preventing SQL Injection Attacks: A Formal Approach.
Mohammad Qbea'h, Mohammad Aref Alshraideh, Khair Eddin Sabri
2016Experimental and Analytical Evaluation of the Impact of Security Compliance on System Performance of Web Applications.
John Oluwole Babatunde
2016Exploiting Vulnerability Disclosures: Statistical Framework and Case Study.
MingJian Tang, Mamoun Alazab, Yuxiu Luo
2016Fraud Prevention Framework for Electronic Business Environments: Automatic Segregation of Online Phishing Attempts.
Nazeeh Ghatasheh
2016IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework.
Nadia Benchikha, Mohamed Krim, Khaled Zeraoulia, Chafika Benzaid
2016Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors.
Andreas Assmuth, Paul Cockshott, Jana Kipke, Karen Renaud, Lewis Mackenzie, Wim Vanderbauwhede, Matthias Söllner, Tilo Fischer, George R. S. Weir
2016Management Attitudes toward Information Security in Omani Public Sector Organisations.
Fathiya Al Izki, George R. S. Weir
2016Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System.
Malek Al-Zewairi, Dima Suleiman, Adnan Shaout
2016Reviewing and Evaluating Existing File Carving Techniques for JPEG Files.
Esra'a Alshammary, Ali Hadi
2016Towards Cloud Security Monitoring: A Case Study.
Umar Mukhtar Ismail, Syed Islam, Shareeful Islam
2016Users Profiling Using Clickstream Data Analysis and Classification.
Wedyan Alswiti, Ja'far Alqatawna, Bashar Al-Shboul, Hossam Faris, Heba Hakh
2016Websites' Input Validation and Input-Misuse-Based Attacks.
Izzat Alsmadi, Iyad Alazzam
2016Where are All the Cyber Terrorists? From Waiting for Cyber Attack to Understanding Audiences.
Julian Droogan, Lise Waldek
2016Windows Forensic Investigations Using PowerForensics Tool.
Akram Barakat, Ali Hadi