| 2016 | A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes. Ja'far Alqatawna, Ali Hadi, Malek Al-Zewairi, Mariam Khader |
| 2016 | A Proposed Model for Malicious Spam Detection in Email Systems of Educational Institutes. Aisha Zaid, Ja'far Alqatawna, Ammar Huneiti |
| 2016 | Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices. Asma Salem, Dema Zaidan, Andraws I. Swidan, Ramzi R. Saifan |
| 2016 | Analyzing CyberCrimes Strategies: The Case of Phishing Attack. Rola Al Halaseh, Ja'far Alqatawna |
| 2016 | Android Forensics: Investigating Social Networking Cybercrimes against Man-in-the-Middle Attacks. Khulood Ali Al Zaabi |
| 2016 | Authentication Techniques for the Internet of Things: A Survey. Maha Saadeh, Azzam Sleit, Mohammed Qatawneh, Wesam Almobaideen |
| 2016 | Boosting Usability for Protecting Online Banking Applications Against APTs. Mohannad Alhanahnah, David W. Chadwick |
| 2016 | Covert Communication Using Port Knocking. Mariam Khader, Ali Hadi, Amjad Hudaib |
| 2016 | Cybersecurity and Cyberforensics Conference, CCC 2016, Amman, Jordan, August 2-4, 2016 |
| 2016 | Cybersecurity and the Unbearability of Uncertainty. Karen Renaud, George R. S. Weir |
| 2016 | Detecting Ransomware with Honeypot Techniques. Chris Moore |
| 2016 | Detecting and Preventing SQL Injection Attacks: A Formal Approach. Mohammad Qbea'h, Mohammad Aref Alshraideh, Khair Eddin Sabri |
| 2016 | Experimental and Analytical Evaluation of the Impact of Security Compliance on System Performance of Web Applications. John Oluwole Babatunde |
| 2016 | Exploiting Vulnerability Disclosures: Statistical Framework and Case Study. MingJian Tang, Mamoun Alazab, Yuxiu Luo |
| 2016 | Fraud Prevention Framework for Electronic Business Environments: Automatic Segregation of Online Phishing Attempts. Nazeeh Ghatasheh |
| 2016 | IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework. Nadia Benchikha, Mohamed Krim, Khaled Zeraoulia, Chafika Benzaid |
| 2016 | Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors. Andreas Assmuth, Paul Cockshott, Jana Kipke, Karen Renaud, Lewis Mackenzie, Wim Vanderbauwhede, Matthias Söllner, Tilo Fischer, George R. S. Weir |
| 2016 | Management Attitudes toward Information Security in Omani Public Sector Organisations. Fathiya Al Izki, George R. S. Weir |
| 2016 | Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System. Malek Al-Zewairi, Dima Suleiman, Adnan Shaout |
| 2016 | Reviewing and Evaluating Existing File Carving Techniques for JPEG Files. Esra'a Alshammary, Ali Hadi |
| 2016 | Towards Cloud Security Monitoring: A Case Study. Umar Mukhtar Ismail, Syed Islam, Shareeful Islam |
| 2016 | Users Profiling Using Clickstream Data Analysis and Classification. Wedyan Alswiti, Ja'far Alqatawna, Bashar Al-Shboul, Hossam Faris, Heba Hakh |
| 2016 | Websites' Input Validation and Input-Misuse-Based Attacks. Izzat Alsmadi, Iyad Alazzam |
| 2016 | Where are All the Cyber Terrorists? From Waiting for Cyber Attack to Understanding Audiences. Julian Droogan, Lise Waldek |
| 2016 | Windows Forensic Investigations Using PowerForensics Tool. Akram Barakat, Ali Hadi |