Proceedings of the 2019 International Conference on Security & Management

SAM'19 Author Index

Editor(s): Kevin Daimi, Hamid R. Arabnia
ISBN: 1-60132-509-6 | Copyright © 2019 CSREA Press | United States of America



Abd-El-Barr, Mostafa
Design Techniques of the S-Box in AES Cryptosystem - A Review and Performance Comparison

Al Zaki Khan, Ehsan
Misuse Intrusion Detection using Machine Learning for Gas Pipeline SCADA Networks

Albalawi, Tahani
That's how I feel: A Study of User's Security Mental Model

AlGhamdi, Ahmed S.
A Survey of Layered Approach to Threats and Countermeasures

Ali, Asad
Out-of-Band Authentication Using 2-Factor Image Matching

Ali-gombe, Aisha
Cross-Platform Malware: Study of the Forthcoming Hazard Adaptation and Behavior

Arai, Kenichi
Formalization of Security Requirements and Attack Models for Cryptographic Hash Functions in ProVerif

Ball, George L.
Semantic Knowledge Architecture for Cyber Security

Beyene, Yared
Smart Voting Keys to e-Democracy

Bou Abdo, Jacques
Survey on Shilling Attacks and their Detection Algorithms in Recommender Systems

Bujud, Dina S.
A Survey of Layered Approach to Threats and Countermeasures

Byrd, Vetria L.
VKE: a Visual Analytics Tool for CyberSecurity Data

Cantrell, Walter A.
Component Selection Process in Assembling Cyberattack Simulation Models

Cerda, Beatrice M.
A Study of Anti-Phising Methodologies and Phishing Detection Algorithms

Desai, Ritwik
Mobile App-Browser Extension Based Authentication

Deshpande, Sumedh Sunil
Identity Management via Blockchain

Devabhaktuni, Vijay
PortableVN: A Generic Mobile Application for Network Security Testbeds

Dholakia, Khushi
An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server

El Khoury Badran, Miriam
Survey on Shilling Attacks and their Detection Algorithms in Recommender Systems

Ertaul, Levent
An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server

Famechon, Benoit
Out-of-Band Authentication Using 2-Factor Image Matching

Futa, Yuichi
Formalization of Security Requirements and Attack Models for Cryptographic Hash Functions in ProVerif

Gao, Boqi
GPU-Accelerated Randomized Newton Method for Fast Training Malicious Web Site Classifier

Ghazinour, Kambiz
That's how I feel: A Study of User's Security Mental Model

Gonzalez-Torres, Antonio
VKE: a Visual Analytics Tool for CyberSecurity Data

Guidetti, Oliver
Towards a Method for Examining the Effects of Cognitive Load on the Performance of Cyber First Responders

Hariri, Salim
Semantic Knowledge Architecture for Cyber Security

Hausawi, Yasser
Impact of Cyber Security Mechanisms on Employees' Behavior

Heutelbeck, Dominic
Attribute Stream-Based Access Control (ASBAC) - Functional Architecture and Patterns

Hice, Scott M.
Component Selection Process in Assembling Cyberattack Simulation Models

Hong, Sunghyuck
Blockchain based IoT node Authentication in WSNs

Horne, Dwight
Toward a Quantum Resistant SecretMatch Privacy Enhanced Technology - A Case Study

Ino, Fumihiko
GPU-Accelerated Randomized Newton Method for Fast Training Malicious Web Site Classifier

Jahan, Farha
PortableVN: A Generic Mobile Application for Network Security Testbeds

Jindal, Sajal
Mobile App-Browser Extension Based Authentication

Jurdi, Wissam
Survey on Shilling Attacks and their Detection Algorithms in Recommender Systems

Katangur, Ajay
Protecting the Unmanned Aerial Vehicle from Cyberattacks

Kewalramani, Hiresha
A Protocol for Service to Service Authentication using Token Challenge Response

Khalid Annuar, Wadi
Vehicle Routing Optimization for Humanitarian Logistics in Disaster Recovery: A Survey

Kumarxe, Madhuri Shiva
Identity Management via Blockchain

Lee, Lai Soon
Vehicle Routing Optimization for Humanitarian Logistics in Disaster Recovery: A Survey

Lu, H. Karen
Out-of-Band Authentication Using 2-Factor Image Matching

Lu, Yuechao
GPU-Accelerated Randomized Newton Method for Fast Training Malicious Web Site Classifier

Lui, Halmon
Security Lessons from Building a Back-End Service for Data Collection

Mayfield, Katia
Component Selection Process in Assembling Cyberattack Simulation Models

McClendon, Jeremiah
Component Selection Process in Assembling Cyberattack Simulation Models

McCreary, Bill
PortableVN: A Generic Mobile Application for Network Security Testbeds

Mehta, Sohil Sanjay
Identity Management via Blockchain

Melton, Austin
That's how I feel: A Study of User's Security Mental Model

Misra, Manoj
Mobile App-Browser Extension Based Authentication

Moll, Maximilian
Vehicle Routing Optimization for Humanitarian Logistics in Disaster Recovery: A Survey

Nair, Suku
Toward a Quantum Resistant SecretMatch Privacy Enhanced Technology - A Case Study

Narayanamoorthy, Jhaghapratha
PortableVN: A Generic Mobile Application for Network Security Testbeds

Nassar, Nader
A Protocol for Service to Service Authentication using Token Challenge Response

Nicholson, Stacy
Cross-Platform Malware: Study of the Forthcoming Hazard Adaptation and Behavior

Niyaz, Quamar
PortableVN: A Generic Mobile Application for Network Security Testbeds

Nunez, Jesus
Protecting the Unmanned Aerial Vehicle from Cyberattacks

Okazaki, Hiroyuki
Formalization of Security Requirements and Attack Models for Cryptographic Hash Functions in ProVerif

Parsons, Paul
VKE: a Visual Analytics Tool for CyberSecurity Data

Petty, Mikel D.
Component Selection Process in Assembling Cyberattack Simulation Models

Pickl, Stefan
Vehicle Routing Optimization for Humanitarian Logistics in Disaster Recovery: A Survey

Pujari, Medha
PortableVN: A Generic Mobile Application for Network Security Testbeds

Puscoci, Sorin
Feature-level Data Fusion for Bio-metric Mobile Applications. A case study

Raje, Pranjali Sanjay
Identity Management via Blockchain

Reyes, Pedro J.
Component Selection Process in Assembling Cyberattack Simulation Models

Saldamli, Gokay
An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server  
Identity Management via Blockchain


Sanikommu, Uma Maheswari
An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server

Saqib, Malik Najmus
A Survey of Layered Approach to Threats and Countermeasures

Sayan, Carla
Semantic Knowledge Architecture for Cyber Security

Seow, Hsin Vonn
Vehicle Routing Optimization for Humanitarian Logistics in Disaster Recovery: A Survey

Serpen, Gursel
Misuse Intrusion Detection using Machine Learning for Gas Pipeline SCADA Networks

Siddiqui, Najam
Out-of-Band Authentication Using 2-Factor Image Matching

Soviany, Cristina
Feature-level Data Fusion for Bio-metric Mobile Applications. A case study

Soviany, Sorin
Feature-level Data Fusion for Bio-metric Mobile Applications. A case study

Speelman, Craig
Towards a Method for Examining the Effects of Cognitive Load on the Performance of Cyber First Responders

Sun, Weiqing
PortableVN: A Generic Mobile Application for Network Security Testbeds

Sze, Arnold J.
Smart Voting Keys to e-Democracy

Tran, Vincent
Protecting the Unmanned Aerial Vehicle from Cyberattacks

Valli, Craig
Towards a Method for Examining the Effects of Cognitive Load on the Performance of Cyber First Responders

Varshney, Gaurav
Mobile App-Browser Extension Based Authentication

Whitaker, Tymaine S.
Component Selection Process in Assembling Cyberattack Simulation Models

Wolfe, Andrew
Smart Voting Keys to e-Democracy

Yoon, John
Chaining JSON Blocks for Secure Transmission of Mobile Data Sequences

Yoshimura, Togo
Formalization of Security Requirements and Attack Models for Cryptographic Hash Functions in ProVerif

Yu, Chen-Hsiang
Security Lessons from Building a Back-End Service for Data Collection

Yuan, Shengli
A Study of Anti-Phising Methodologies and Phishing Detection Algorithms

Zahran, Bassam
Cross-Platform Malware: Study of the Forthcoming Hazard Adaptation and Behavior



Administered by
Universal Conference Management Systems & Support (UCMSS)
** San Diego, California, USA **