Proceedings of the 2018 International Conference on Security & Management

SAM'18 Table of Contents

Editor(s): Kevin Daimi, Hamid R. Arabnia
ISBN: 1-60132-488-X | Copyright © 2018 CSREA Press | United States of America


Detecting Vulnerabilities within Black Boxed CPUs using Assertion Based Verification for Enhanced Security 3-8
Juan Portillo, Eugene John
Model Checking Security Pattern Combination 9-15
Fadi Obeid, Philippe Dhaussy
What we Learn from Learning - Understanding Capabilities and Limitations of Machine Learning in Botnet Attacks 16-22
David Santana, Shan Suthaharan, Somya Mohanty
Network Security Risk Assessment Based on Weighted PageRank 23-26
Lei Ai, Tao Li, Xiaojie Liu, Hui Zhao, Jin Yang
Domain Name System (DNS) Security: Attacks Identification and Protection Methods 27-33
Sanjay, Balaji Rajendran, Pushparaj Shetty


Secure Communication Protocol: Application to Large Number of Distributed Sensors 37-41
Fadi Obeid, Philippe Dhaussy
Analysis of McEliece Cryptosystem on Raspberry Pi 3 42-48
Gokay Saldamli, Levent Ertaul, Krishnaraj M. A. Menon
There are No Non-Witnesses 49-53
Robert D. McLeod, Marcia R. Friesen
An Efficient Solution for Remote User Authentication Using DNA Crypto and Steganography 54-60
Misbahuddin Mohammed
Extended Fault-Tolerant Visual Secret Sharing Scheme without Pixel Expansion 61-67
Justie Su-Tzu Juan, Yung-Chang Chen


Investigation of Vulnerabilities with Monitoring Tools 71-78
Kazi Zunnurhain, Ankur J. Patel, Mairura James
Evaluating Security of Software Through Vulnerability Metrics 79-85
Jonathan Sonnerup, Martin Hell
A Blockchain System Integrity Model 86-92
Mahalingam Ramkumar
Cyber Security Trust Framework 93-96
Dana Isa Al-Tehmazi
Predicting Insider Threats by Behavioural Analysis using Deep Learning 97-101
Kaushal Bhavsar, Bhushan Trivedi


Selection and Promotion Criteria of Information Security Personnel: Lebanon Case Study 105-110
Esther Nehme, Jacques Bou Abdo, Jacques Demerjian
Scenario-based Learning Approach to Industrial Control Systems Security Training 111-116
Guillermo A. Francia III
Get a Clue: A Hands-On Exercise for Password Cracking 117-121
Rosemary Arends, Raya Deussen, Benjamin Green, Jodi Rush, Jens Mache, Richard Weiss
Social Engineering and Its Impacts on Critical Infrastructure: A Comprehensive Survey 122-128
Jason Pollack, Prakash Ranganathan
Aviation Navigation Systems Security: ADS-B, GPS, IFF 129-135
Jason Pollack, Prakash Ranganathan
A Software Assistant for the Development of Secure, Usable and Economically Meaningful Software 136-142
Christopher Ruff, Andrea Horch
Improving the Permission Model to Protect the Smartphone Users' Privacy and Applying it on Android 143-149
Nasir Eisty, Abigail Payne, Travis Atkison


Memory Forensics Methodology for Investigating Cryptocurrency Protocols 153-159
Shaimaa Sherif Ali, Ahmed ElAshmawy, Ahmed F. Shosha
A Comparison of Machine Learning Classifiers for Acoustic Gait Analysis 160-166
Jasper Huang, Fabio Di Troia, Mark Stamp
Minutiae Point Extraction for Fingerprint Identification System 167-173
Ifeoma Ugochi Ohaeri, Micheal Bukohwo Esiefarienhe
Multimodal Biometrics via Discriminant Correlation Analysis on Mobile Devices 174-181
Mikhail Gofman, Narciso Sandico, Sinjini Mitra, Eryu Suo, Sadun Muhi, Tyler Vu
The Authentication System Automatically Generating Feature Points - Effect of Dummy Feature Points 182-187
Hiroshi Dozono, Tatsuya Chuto, Kenta Uchikoshi, Masanori Nakakuni


Electromagnetic Antenna Sensors for Security Systems' Applications 191-194
Tamer Abouelnaga, Haythm Hussien, Hala Elsadek, Hehsam ELdeeb
Semi-Fragile Watermarking Scheme For CFA Images Based on Authentication Table 195-201
Chia-Chen Lin, Xiao-Long Liu,  Cheng-Han Lin
VW16F: A Robust Video Watermarking Using Simulated Block Based Spatial Domain Technique 202-207
Farnaz Arab, Mazdak Zamani
Developing a UI and Automation Framework for a Cybersecurity Research and Experimentation Environment 208-213
Cody Butler, George Thompson, George Hsieh, Mary Ann Hoppa, Kevin S. Nauer
Performance Evaluation of Diagonal Partitioning for Security-Aware Data Management in the Cloud 214-219
Dennis Kern, Jens Kohler, Oliver Hummel, Thomas Specht
TwitterOSINT: Automated Cybersecurity Threat Intelligence Collection and Analysis using Twitter Data 220-226
Satyanarayan Raju Vadapalli, George Hsieh, Kevin S. Nauer
Protecting Sensitive Data in Android SQLite Databases Using TrustZone 227-233
Francis Akowuah, Amit Ahlawat, Wenliang Du


Petri Nets with Players, Strategies, and Cost: A Formalism for Modeling Cyberattacks 237-244
Katia Mayfield, Mikel Petty
A Comprehensive Model for Elucidating Advanced Persistent Threats (APT) 245-251
Rudra Prasad Baksi, Shambhu J. Upadhyaya
Applying the Kill Chain and Diamond Models to Microsoft Advanced Threat Analytics 252-258
Levent Ertaul, Mina Mousa
Automating Deployment of Gh0st Remote Access Trojan Malware 259-265
Brandon Johnson , George Hsieh, Mary Ann Hoppa
Computer Attacks as Machines of Things that Flow 266-273
Sabah Al-Fedaghi, Mennat Allah Bayoumi
An Immunity-based Security Threat Detection Model for Digital Virtual Assets 274-280
Ping Lin, Tao Li, Xiaojie Liu, Hui Zhao, Xiaojun Zhou, Fangdong Zhu


A Frequency Analysis of Malicious IP Addresses against a Supercomputing Service Environment 283-284
Jae-Kook Lee, Sung-Jun Kim, Minsu Joh, Jong-Hoon Ahn
Fair Vulnerability Determined using Attack Graphs 285-286
Beth Anderson
User-Centric Cryptography 287-288
Gideon Samid


Incorporating Delegation into ABAC: Healthcare Information System use Case. 291-297
Khaled Sabahein, Brian Reithel, Feng Wang
Security in Identity Management: A Systems Dynamics' Approach 298-305
Goodness Chama, John-Paul Cleron, Mathias Fonkam
Security Challenges in Smart City Applications 306-310
Safwan Mawlood Hussein , Michael J. Donahoo, Tomas Cerny


Administered by
Universal Conference Management Systems & Support (UCMSS)
** San Diego, California, USA **