Proceedings of the 2018 International Conference on Security & Management

SAM'18 Author Index

Editor(s): Kevin Daimi, Hamid R. Arabnia
ISBN: 1-60132-488-X | Copyright © 2018 CSREA Press | United States of America



Abouelnaga, Tamer
Electromagnetic Antenna Sensors for Security Systems' Applications

Ahlawat, Amit
Protecting Sensitive Data in Android SQLite Databases Using TrustZone

Ahn, Jong-Hoon
A Frequency Analysis of Malicious IP Addresses against a Supercomputing Service Environment

Ai, Lei
Network Security Risk Assessment Based on Weighted PageRank

Akowuah, Francis
Protecting Sensitive Data in Android SQLite Databases Using TrustZone

Al-Fedaghi, Sabah
Computer Attacks as Machines of Things that Flow

Al-Tehmazi, Dana Isa
Cyber Security Trust Framework

Anderson, Beth
Fair Vulnerability Determined using Attack Graphs

Arab, Farnaz
VW16F: A Robust Video Watermarking Using Simulated Block Based Spatial Domain Technique

Arends, Rosemary
Get a Clue: A Hands-On Exercise for Password Cracking

Atkison, Travis
Improving the Permission Model to Protect the Smartphone Users' Privacy and Applying it on Android

Baksi, Rudra Prasad
A Comprehensive Model for Elucidating Advanced Persistent Threats (APT)

Bayoumi, Mennat Allah
Computer Attacks as Machines of Things that Flow

Bhavsar, Kaushal
Predicting Insider Threats by Behavioural Analysis using Deep Learning

Bou Abdo, Jacques
Selection and Promotion Criteria of Information Security Personnel: Lebanon Case Study

Butler, Cody
Developing a UI and Automation Framework for a Cybersecurity Research and Experimentation Environment

Cerny, Tomas
Security Challenges in Smart City Applications

Chama, Goodness
Security in Identity Management: A Systems Dynamics' Approach

Chen, Yung-Chang
Extended Fault-Tolerant Visual Secret Sharing Scheme without Pixel Expansion

Chuto, Tatsuya
The Authentication System Automatically Generating Feature Points - Effect of Dummy Feature Points

Cleron, John-Paul
Security in Identity Management: A Systems Dynamics' Approach

Demerjian, Jacques
Selection and Promotion Criteria of Information Security Personnel: Lebanon Case Study

Deussen, Raya
Get a Clue: A Hands-On Exercise for Password Cracking

Dhaussy, Philippe
Model Checking Security Pattern Combination  
Secure Communication Protocol: Application to Large Number of Distributed Sensors


Di Troia, Fabio
A Comparison of Machine Learning Classifiers for Acoustic Gait Analysis

Donahoo, Michael J.
Security Challenges in Smart City Applications

Dozono, Hiroshi
The Authentication System Automatically Generating Feature Points - Effect of Dummy Feature Points

Du, Wenliang
Protecting Sensitive Data in Android SQLite Databases Using TrustZone

Eisty, Nasir
Improving the Permission Model to Protect the Smartphone Users' Privacy and Applying it on Android

ElAshmawy, Ahmed
Memory Forensics Methodology for Investigating Cryptocurrency Protocols

ELdeeb, Hehsam
Electromagnetic Antenna Sensors for Security Systems' Applications

Elsadek, Hala
Electromagnetic Antenna Sensors for Security Systems' Applications

Ertaul, Levent
Analysis of McEliece Cryptosystem on Raspberry Pi 3  
Applying the Kill Chain and Diamond Models to Microsoft Advanced Threat Analytics


Esiefarienhe, Micheal Bukohwo
Minutiae Point Extraction for Fingerprint Identification System

Fonkam, Mathias
Security in Identity Management: A Systems Dynamics' Approach

Francia III, Guillermo A.
Scenario-based Learning Approach to Industrial Control Systems Security Training

Friesen, Marcia R.
There are No Non-Witnesses

Gofman, Mikhail
Multimodal Biometrics via Discriminant Correlation Analysis on Mobile Devices

Green, Benjamin
Get a Clue: A Hands-On Exercise for Password Cracking

Hell, Martin
Evaluating Security of Software Through Vulnerability Metrics

Hoppa, Mary Ann
Developing a UI and Automation Framework for a Cybersecurity Research and Experimentation Environment  
Automating Deployment of Gh0st Remote Access Trojan Malware


Horch, Andrea
A Software Assistant for the Development of Secure, Usable and Economically Meaningful Software

Hsieh, George
Developing a UI and Automation Framework for a Cybersecurity Research and Experimentation Environment  
TwitterOSINT: Automated Cybersecurity Threat Intelligence Collection and Analysis using Twitter Data
 
Automating Deployment of Gh0st Remote Access Trojan Malware


Huang, Jasper
A Comparison of Machine Learning Classifiers for Acoustic Gait Analysis

Hummel, Oliver
Performance Evaluation of Diagonal Partitioning for Security-Aware Data Management in the Cloud

Hussein , Safwan Mawlood
Security Challenges in Smart City Applications

Hussien, Haythm
Electromagnetic Antenna Sensors for Security Systems' Applications

James, Mairura
Investigation of Vulnerabilities with Monitoring Tools

Joh, Minsu
A Frequency Analysis of Malicious IP Addresses against a Supercomputing Service Environment

John, Eugene
Detecting Vulnerabilities within Black Boxed CPUs using Assertion Based Verification for Enhanced Security

Johnson , Brandon
Automating Deployment of Gh0st Remote Access Trojan Malware

Juan, Justie Su-Tzu
Extended Fault-Tolerant Visual Secret Sharing Scheme without Pixel Expansion

Kern, Dennis
Performance Evaluation of Diagonal Partitioning for Security-Aware Data Management in the Cloud

Kim, Sung-Jun
A Frequency Analysis of Malicious IP Addresses against a Supercomputing Service Environment

Kohler, Jens
Performance Evaluation of Diagonal Partitioning for Security-Aware Data Management in the Cloud

Lee, Jae-Kook
A Frequency Analysis of Malicious IP Addresses against a Supercomputing Service Environment

Li, Tao
Network Security Risk Assessment Based on Weighted PageRank  
An Immunity-based Security Threat Detection Model for Digital Virtual Assets


Lin , Cheng-Han
Semi-Fragile Watermarking Scheme For CFA Images Based on Authentication Table

Lin, Chia-Chen
Semi-Fragile Watermarking Scheme For CFA Images Based on Authentication Table

Lin, Ping
An Immunity-based Security Threat Detection Model for Digital Virtual Assets

Liu, Xiao-Long
Semi-Fragile Watermarking Scheme For CFA Images Based on Authentication Table

Liu, Xiaojie
Network Security Risk Assessment Based on Weighted PageRank  
An Immunity-based Security Threat Detection Model for Digital Virtual Assets


Mache, Jens
Get a Clue: A Hands-On Exercise for Password Cracking

Mayfield, Katia
Petri Nets with Players, Strategies, and Cost: A Formalism for Modeling Cyberattacks

McLeod, Robert D.
There are No Non-Witnesses

Menon, Krishnaraj M. A.
Analysis of McEliece Cryptosystem on Raspberry Pi 3

Mitra, Sinjini
Multimodal Biometrics via Discriminant Correlation Analysis on Mobile Devices

Mohammed, Misbahuddin
An Efficient Solution for Remote User Authentication Using DNA Crypto and Steganography

Mohanty, Somya
What we Learn from Learning - Understanding Capabilities and Limitations of Machine Learning in Botnet Attacks

Mousa, Mina
Applying the Kill Chain and Diamond Models to Microsoft Advanced Threat Analytics

Muhi, Sadun
Multimodal Biometrics via Discriminant Correlation Analysis on Mobile Devices

Nakakuni, Masanori
The Authentication System Automatically Generating Feature Points - Effect of Dummy Feature Points

Nauer, Kevin S.
Developing a UI and Automation Framework for a Cybersecurity Research and Experimentation Environment  
TwitterOSINT: Automated Cybersecurity Threat Intelligence Collection and Analysis using Twitter Data


Nehme, Esther
Selection and Promotion Criteria of Information Security Personnel: Lebanon Case Study

Obeid, Fadi
Model Checking Security Pattern Combination  
Secure Communication Protocol: Application to Large Number of Distributed Sensors


Ohaeri, Ifeoma Ugochi
Minutiae Point Extraction for Fingerprint Identification System

Patel, Ankur J.
Investigation of Vulnerabilities with Monitoring Tools

Payne, Abigail
Improving the Permission Model to Protect the Smartphone Users' Privacy and Applying it on Android

Petty, Mikel
Petri Nets with Players, Strategies, and Cost: A Formalism for Modeling Cyberattacks

Pollack, Jason
Social Engineering and Its Impacts on Critical Infrastructure: A Comprehensive Survey  
Aviation Navigation Systems Security: ADS-B, GPS, IFF


Portillo, Juan
Detecting Vulnerabilities within Black Boxed CPUs using Assertion Based Verification for Enhanced Security

Rajendran, Balaji
Domain Name System (DNS) Security: Attacks Identification and Protection Methods

Ramkumar, Mahalingam
A Blockchain System Integrity Model

Ranganathan, Prakash
Social Engineering and Its Impacts on Critical Infrastructure: A Comprehensive Survey  
Aviation Navigation Systems Security: ADS-B, GPS, IFF


Reithel, Brian
Incorporating Delegation into ABAC: Healthcare Information System use Case.

Ruff, Christopher
A Software Assistant for the Development of Secure, Usable and Economically Meaningful Software

Rush, Jodi
Get a Clue: A Hands-On Exercise for Password Cracking

Sabahein, Khaled
Incorporating Delegation into ABAC: Healthcare Information System use Case.

Saldamli, Gokay
Analysis of McEliece Cryptosystem on Raspberry Pi 3

Samid, Gideon
User-Centric Cryptography

Sandico, Narciso
Multimodal Biometrics via Discriminant Correlation Analysis on Mobile Devices

Sanjay,
Domain Name System (DNS) Security: Attacks Identification and Protection Methods

Santana, David
What we Learn from Learning - Understanding Capabilities and Limitations of Machine Learning in Botnet Attacks

Sherif Ali, Shaimaa
Memory Forensics Methodology for Investigating Cryptocurrency Protocols

Shetty, Pushparaj
Domain Name System (DNS) Security: Attacks Identification and Protection Methods

Shosha, Ahmed F.
Memory Forensics Methodology for Investigating Cryptocurrency Protocols

Sonnerup, Jonathan
Evaluating Security of Software Through Vulnerability Metrics

Specht, Thomas
Performance Evaluation of Diagonal Partitioning for Security-Aware Data Management in the Cloud

Stamp, Mark
A Comparison of Machine Learning Classifiers for Acoustic Gait Analysis

Suo, Eryu
Multimodal Biometrics via Discriminant Correlation Analysis on Mobile Devices

Suthaharan, Shan
What we Learn from Learning - Understanding Capabilities and Limitations of Machine Learning in Botnet Attacks

Thompson, George
Developing a UI and Automation Framework for a Cybersecurity Research and Experimentation Environment

Trivedi, Bhushan
Predicting Insider Threats by Behavioural Analysis using Deep Learning

Uchikoshi, Kenta
The Authentication System Automatically Generating Feature Points - Effect of Dummy Feature Points

Upadhyaya, Shambhu J.
A Comprehensive Model for Elucidating Advanced Persistent Threats (APT)

Vadapalli, Satyanarayan Raju
TwitterOSINT: Automated Cybersecurity Threat Intelligence Collection and Analysis using Twitter Data

Vu, Tyler
Multimodal Biometrics via Discriminant Correlation Analysis on Mobile Devices

Wang, Feng
Incorporating Delegation into ABAC: Healthcare Information System use Case.

Weiss, Richard
Get a Clue: A Hands-On Exercise for Password Cracking

Yang, Jin
Network Security Risk Assessment Based on Weighted PageRank

Zamani, Mazdak
VW16F: A Robust Video Watermarking Using Simulated Block Based Spatial Domain Technique

Zhao, Hui
Network Security Risk Assessment Based on Weighted PageRank  
An Immunity-based Security Threat Detection Model for Digital Virtual Assets


Zhou, Xiaojun
An Immunity-based Security Threat Detection Model for Digital Virtual Assets

Zhu, Fangdong
An Immunity-based Security Threat Detection Model for Digital Virtual Assets

Zunnurhain, Kazi
Investigation of Vulnerabilities with Monitoring Tools



Administered by
Universal Conference Management Systems & Support (UCMSS)
** San Diego, California, USA **