Proceedings of the 2017 International Conference on Security and Management

SAM'17 Author Index

Editor(s): Kevin Daimi, Hamid R. Arabnia
ISBN: 1-60132-467-7 | Copyright © 2017 CSREA Press | United States of America



Abbott, Anne
Backup Monitoring in Large Heterogeneous Business Cloud Computing Environments: A Framework for the Development of a Reliable Automated Process

Afifi, Hossam
A New Key Management And Authentication Architecture For ZigBee Networks (KAAZ)

Al-Salah, Tulha
Cost Integrated Schemes for Decoy Deployment in Virtualized Cloud Services Protection

Alblwi, Samia
A Survey on Wireless Security Protocol WPA2

Ali, Kashaan
Using IDS to prevent XSS Attacks

Amer, Suhair
Undergraduate Software Engineering Experience Developing an Authentication System

Amer, Suhair
Steganography - Capstone Experience Project

Aoudjit, Rachida
A New Key Management And Authentication Architecture For ZigBee Networks (KAAZ)

Atkison, Travis
Examining Features for Android Malware Detection  
An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling


Baihan, Abdullah
A High-order Masking Approach for CLEFIA Implementation on FPGA and Intel.

Baihan, Mohammed
A High-order Masking Approach for CLEFIA Implementation on FPGA and Intel.

Bengtsson, Johan
The Significance of Information Security Risk Assessments: Exploring the Consensus of Raters' Perceptions of Probability and Severity

Boinapally, Vamshika
Building a Gh0st Malware Experimentation Environment

Bongiri, Samrat
Using Pattern Filtering to Detect Cross-Site Attacks

Bott, Erica
Model for Autonomous Correlation of Intrusion Detection State Variables over Spatial, Temporal, and Ontological Domains

Butler, Cody
Building a Virtual Enterprise Network Environment for APT Experimentation

Cerda, Beatrice
Protection from Black Hole Attacks in Communication Networks

Chada, Naveen
A Framework for Web Applications Security and Response System

Cheng, Lee-ming
Dynamic Scalable ECC Scheme and Its Application to Encryption Workflow Design

Choi, Jin-Young
A Study on Korea's Information Security Management System: An Insider Threat Perspective  
Formal Specification and Verification of Firewall using TLA+


Duggirala, Parasara Sridhar
A High-order Masking Approach for CLEFIA Implementation on FPGA and Intel.

Echallier, Nicolas
Virtual Keyboard Logging Counter-measures using Common Fate's Law

Ertaul, Levent
Performance Analysis of CLEFIA, PICCOLO, TWINE Lightweight Block Ciphers in IoT Environment  
IoT Security: Performance Evaluation of Grain, MICKEY, and Trivium - Lightweight Stream Ciphers


Galvin, SeanMichael Yurko
Building a Virtual Enterprise Network Environment for APT Experimentation

Ganadu, Maria
Cloud Solution for Management and Security in Temporary Reception Centres

Garcia, Mario
Using Pattern Filtering to Detect Cross-Site Attacks

Gedi, Ahmed
Analyzing and Improving the NCL Ethical Hacking Lab Exercises

Grimaud, Gilles
Virtual Keyboard Logging Counter-measures using Common Fate's Law

Guha, Ratan
Probabilistic Deception and Attacker Experimentation

Hallberg, Jonas
The Significance of Information Security Risk Assessments: Exploring the Consensus of Raters' Perceptions of Probability and Severity

Hallberg, Niklas
The Significance of Information Security Risk Assessments: Exploring the Consensus of Raters' Perceptions of Probability and Severity

Haque, Shariful
An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling

Hassan, Sharif
Probabilistic Deception and Attacker Experimentation

Helal, Mohammad Rahat
Efficient Isolation Enabled Role-Based Access Control for Database Systems

Hernandez-Diez, Carmen
Applying Security to Moodle Grades

Hinds, Cheryl
Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices

Hoceini, Ouassila
A New Key Management And Authentication Architecture For ZigBee Networks (KAAZ)

Hong, Liang
Cost Integrated Schemes for Decoy Deployment in Virtualized Cloud Services Protection

Hong, Sunghyuck
MAC address based Sensor Network Authentication: Survey

Hong, Taeyoung
An Analysis of Intrusion Prevention Data Against HPC Services in KISTI

Horne, Dwight
Privacy-Enhanced and Fair Matchmaking System - Applications and Analysis of Protocol, Architecture, and Performance

Hsieh, George
Building a Gh0st Malware Experimentation Environment  
Building a Virtual Enterprise Network Environment for APT Experimentation


Hsu, Fu-Hau
A Light-weight Method to Send and Receive SMS Messages in an Emulator

Hummert, Christian
Android-App-Dissection on the Wandboard - Automatic Analysis of Malicious Mobile Code

Hwang, Yan-Ling
A Light-weight Method to Send and Receive SMS Messages in an Emulator

Iguchi-Cartigny, Julien
Virtual Keyboard Logging Counter-measures using Common Fate's Law

Itaba, Chiaki
Evaluation of Highly Efficient Scalar Multiplication in Elliptic Curve Cryptography

Javaid, Ahmad Y.
Efficient Isolation Enabled Role-Based Access Control for Database Systems

Kang, Miyoung
Formal Specification and Verification of Firewall using TLA+

Kao, Chuan-Kai
A Light-weight Method to Send and Receive SMS Messages in an Emulator

Kar, Dulal
A Framework for Web Applications Security and Response System

Karlzen, Henrik
The Significance of Information Security Risk Assessments: Exploring the Consensus of Raters' Perceptions of Probability and Severity

Katangur, Ajay
A Framework for Web Applications Security and Response System

Keffeler, Miclain
Examining Features for Android Malware Detection  
An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling


Kim, Dae-Soo
Improved Reversible Data hiding using Mean Values in an Encrypted Image

Kim, Dong-Hoon
A Chaining User Authentication with Distributed Clustering in the IoT Environment

Kim, Pyung-Han
Threshold Secret Sharing based on 3D-Cellular Automata

Kim, Sung-Jun
An Analysis of Intrusion Prevention Data Against HPC Services in KISTI

Kim, Young-Mi
Formal Specification and Verification of Firewall using TLA+

Kinoshita, Toshiyuki
Evaluation of Highly Efficient Scalar Multiplication in Elliptic Curve Cryptography

Ko, Kyungil
MAC address based Sensor Network Authentication: Survey

Koikara, Rosemary
Threshold Secret Sharing based on 3D-Cellular Automata

Koike, Itaru
Evaluation of Highly Efficient Scalar Multiplication in Elliptic Curve Cryptography

Kwon, Hun Yeong
A Study on Korea's Information Security Management System: An Insider Threat Perspective

Lee, Chia-Hao
A Light-weight Method to Send and Receive SMS Messages in an Emulator

Lee, Jae-Kook
An Analysis of Intrusion Prevention Data Against HPC Services in KISTI

Lee, Ki Young
A Chaining User Authentication with Distributed Clustering in the IoT Environment

Lee, Seungmin
Vulnerability Analysis and Attacks on Intel Xeon Phi Coprocessor

Leeds, Matthew
Examining Features for Android Malware Detection

Lim, Jong In
A Study on Korea's Information Security Management System: An Insider Threat Perspective

Mache, Jens
Analyzing and Improving the NCL Ethical Hacking Lab Exercises

Marcos-Garcia, Jose Antonio
Applying Security to Moodle Grades

Martinez-Belmares, Ester
Protection from Black Hole Attacks in Communication Networks

Masala, Giovanni
Cloud Solution for Management and Security in Temporary Reception Centres

Mitchell, Erica
NOAH for IoT: Cybersecurity Strategy for Home Applications

Miyamoto, Nozomi
Evaluation of Highly Efficient Scalar Multiplication in Elliptic Curve Cryptography

Mohamed, Khalid
Using IDS to prevent XSS Attacks

Moll, Maximilian
A Visual Approach to Data Fusion in Sensor Networks

Nair, Suku
Privacy-Enhanced and Fair Matchmaking System - Applications and Analysis of Protocol, Architecture, and Performance

Nauer, Kevin S.
Building a Gh0st Malware Experimentation Environment  
Building a Virtual Enterprise Network Environment for APT Experimentation


Nyakundi, Eric
Comparison of SVMs with Radial-Basis function and Polynomial Kernels in Classification of Categories in Intrusion Detection

Obimbo, Charlie
Using IDS to prevent XSS Attacks  
Comparison of SVMs with Radial-Basis function and Polynomial Kernels in Classification of Categories in Intrusion Detection


Oraa-Perez, Sofia
Applying Security to Moodle Grades

Park, Joon
NOAH for IoT: Cybersecurity Strategy for Home Applications

Park, Ju-Won
Vulnerability Analysis and Attacks on Intel Xeon Phi Coprocessor

Park, Ran Kyoung
A Study on Korea's Information Security Management System: An Insider Threat Perspective

Paul, Anand
Threshold Secret Sharing based on 3D-Cellular Automata

Perry, Kaila M.
Building a Virtual Enterprise Network Environment for APT Experimentation

Petrova, Krassie
Backup Monitoring in Large Heterogeneous Business Cloud Computing Environments: A Framework for the Development of a Reliable Automated Process

Pham, Truong Son
A Visual Approach to Data Fusion in Sensor Networks

Pickl, Stefan Wolfgang
A Visual Approach to Data Fusion in Sensor Networks

Place, Jean-Marie
Virtual Keyboard Logging Counter-measures using Common Fate's Law

Pola, Roberta
Cloud Solution for Management and Security in Temporary Reception Centres

Qiu, Wenxing
Undergraduate Software Engineering Experience Developing an Authentication System

Rahim, Balal
Analyzing and Improving the NCL Ethical Hacking Lab Exercises

Rajegowda , Sachin Kattepura
Performance Analysis of CLEFIA, PICCOLO, TWINE Lightweight Block Ciphers in IoT Environment

Ramkumar, Mahalingam
Minimal TCB for System-Model Execution

Roberts, Jesse
Model for Autonomous Correlation of Intrusion Detection State Variables over Spatial, Temporal, and Ontological Domains

Seo, Kyung-Yoon
Improved Reversible Data hiding using Mean Values in an Encrypted Image

Sherfield, Joshua
Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices

Shoemaker, George
Analyzing and Improving the NCL Ethical Hacking Lab Exercises

Shujaee, Khalil
A Survey on Wireless Security Protocol WPA2

Sommestad, Teodor
The Significance of Information Security Risk Assessments: Exploring the Consensus of Raters' Perceptions of Probability and Severity

Sun, Weiqing
Efficient Isolation Enabled Role-Based Access Control for Database Systems

Tan, Nick
Analyzing and Improving the NCL Ethical Hacking Lab Exercises

Vert, Gregory
Model for Autonomous Correlation of Intrusion Detection State Variables over Spatial, Temporal, and Ontological Domains

Wang, Jia
Dynamic Scalable ECC Scheme and Its Application to Encryption Workflow Design

Wary, Jean-Phillipe
Virtual Keyboard Logging Counter-measures using Common Fate's Law

Weiss, Richard
Analyzing and Improving the NCL Ethical Hacking Lab Exercises

Winkler, Heiner
Android-App-Dissection on the Wandboard - Automatic Analysis of Malicious Mobile Code

Woodall, Arnold
IoT Security: Performance Evaluation of Grain, MICKEY, and Trivium - Lightweight Stream Ciphers

Yoo, Kee-Young
Threshold Secret Sharing based on 3D-Cellular Automata  
Improved Reversible Data hiding using Mean Values in an Encrypted Image


Yoon, Eun-Jun
Improved Reversible Data hiding using Mean Values in an Encrypted Image

You, Chi-Yu
A Light-weight Method to Send and Receive SMS Messages in an Emulator

Yuan, Shengli
Protection from Black Hole Attacks in Communication Networks

Zsifkovits, Martin
A Visual Approach to Data Fusion in Sensor Networks



Administered by
Universal Conference Management Systems & Support (UCMSS)
** San Diego, California, USA **