Proceedings of the 2019 International Conference on Security & Management

SAM'19 Author Index

Editor(s): Kevin Daimi, Hamid R. Arabnia
ISBN: 1-60132-509-6 | Copyright © 2019 CSREA Press | United States of America



Abd-El-Barr, Mostafa
Design Techniques of the S-Box in AES Cryptosystem - A Review and Performance Comparison

Al Zaki Khan, Ehsan
Misuse Intrusion Detection using Machine Learning for Gas Pipeline SCADA Networks

Albalawi, Tahani
That's how I feel: A Study of User's Security Mental Model

AlGhamdi, Ahmed S.
A Survey of Layered Approach to Threats and Countermeasures

Ali, Asad
Out-of-Band Authentication Using 2-Factor Image Matching

Ali-gombe, Aisha
Cross-Platform Malware: Study of the Forthcoming Hazard Adaptation and Behavior

Arai, Kenichi
Formalization of Security Requirements and Attack Models for Cryptographic Hash Functions in ProVerif

Ball, George L.
Semantic Knowledge Architecture for Cyber Security

Beyene, Yared
Smart Voting Keys to e-Democracy

Bou Abdo, Jacques
Survey on Shilling Attacks and their Detection Algorithms in Recommender Systems

Bujud, Dina S.
A Survey of Layered Approach to Threats and Countermeasures

Byrd, Vetria L.
VKE: a Visual Analytics Tool for CyberSecurity Data

Cantrell, Walter A.
Component Selection Process in Assembling Cyberattack Simulation Models

Cerda, Beatrice M.
A Study of Anti-Phising Methodologies and Phishing Detection Algorithms

Cheng, Bo-Chao
A Novel Approach to Identify Confidential Data in Data Leakage Prevention Systems

Chenou, Jules
Increasing the Robustness of Deep Learning with Colored Noise Augmentation

Desai, Ritwik
Mobile App-Browser Extension Based Authentication

Deshpande, Sumedh Sunil
Identity Management via Blockchain

Devabhaktuni, Vijay
PortableVN: A Generic Mobile Application for Network Security Testbeds

Dholakia, Khushi
An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server

El Khoury Badran, Miriam
Survey on Shilling Attacks and their Detection Algorithms in Recommender Systems

Elewa, Amani Salah
Design and FPGA Implementation of One-Time- Key Cipher System DNA Based

Engler, Philipp
Android App Dissection on the Wandboard - Evolving the Platform Into One-Button Solution

Ertaul, Levent
An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server

Famechon, Benoit
Out-of-Band Authentication Using 2-Factor Image Matching

Fields, Tonya L.
Increasing the Robustness of Deep Learning with Colored Noise Augmentation

Fonkam, Mathias
Novel Extended Federated Authentication and Authorization Framework

Futa, Yuichi
Formalization of Security Requirements and Attack Models for Cryptographic Hash Functions in ProVerif

Gao, Boqi
GPU-Accelerated Randomized Newton Method for Fast Training Malicious Web Site Classifier

Ghazinour, Kambiz
That's how I feel: A Study of User's Security Mental Model

Ghorbani, Ali A.
Probabilistic Classification for Industrial Cyber Risk Using Deep Neural Network

Gonzalez-Torres, Antonio
VKE: a Visual Analytics Tool for CyberSecurity Data

Guidetti, Oliver
Towards a Method for Examining the Effects of Cognitive Load on the Performance of Cyber First Responders

Habibi Lashkari, Arash
Probabilistic Classification for Industrial Cyber Risk Using Deep Neural Network

Hariri, Salim
Semantic Knowledge Architecture for Cyber Security

Hausawi, Yasser
Impact of Cyber Security Mechanisms on Employees' Behavior

Heutelbeck, Dominic
Attribute Stream-Based Access Control (ASBAC) - Functional Architecture and Patterns

Hice, Scott M.
Component Selection Process in Assembling Cyberattack Simulation Models

Hong, Sunghyuck
Blockchain based IoT node Authentication in WSNs

Horne, Dwight
Toward a Quantum Resistant SecretMatch Privacy Enhanced Technology - A Case Study

Hsieh, George
Increasing the Robustness of Deep Learning with Colored Noise Augmentation

Hummert, Christian
Android App Dissection on the Wandboard - Evolving the Platform Into One-Button Solution

Inan, Aykan
Algorithm for a Time Efficient Calculation of the Statistical Distribution of Primes

Ino, Fumihiko
GPU-Accelerated Randomized Newton Method for Fast Training Malicious Web Site Classifier

Issa, Hanady H.
Design and FPGA Implementation of One-Time- Key Cipher System DNA Based

Jahan, Farha
PortableVN: A Generic Mobile Application for Network Security Testbeds

Jindal, Sajal
Mobile App-Browser Extension Based Authentication

Jurdi, Wissam
Survey on Shilling Attacks and their Detection Algorithms in Recommender Systems

Kambhampaty, Krishna
Identifying Insider and Masquerade attackers in Cloud Computing and IoT Devices

Katangur, Ajay
Protecting the Unmanned Aerial Vehicle from Cyberattacks

Kewalramani, Hiresha
A Protocol for Service to Service Authentication using Token Challenge Response

Khalid Annuar, Wadi
Vehicle Routing Optimization for Humanitarian Logistics in Disaster Recovery: A Survey

Kumarxe, Madhuri Shiva
Identity Management via Blockchain

Lee, Lai Soon
Vehicle Routing Optimization for Humanitarian Logistics in Disaster Recovery: A Survey

Lenk, Christopher
Android App Dissection on the Wandboard - Evolving the Platform Into One-Button Solution

Lodgher, Akhtar
Fundamental Defensive Programming Practices with Secure Coding Modules

Lu, H. Karen
Out-of-Band Authentication Using 2-Factor Image Matching

Lu, Yuechao
GPU-Accelerated Randomized Newton Method for Fast Training Malicious Web Site Classifier

Lui, Halmon
Security Lessons from Building a Back-End Service for Data Collection

Maleki, Nasim
Probabilistic Classification for Industrial Cyber Risk Using Deep Neural Network

Mayfield, Katia
Component Selection Process in Assembling Cyberattack Simulation Models

McClendon, Jeremiah
Component Selection Process in Assembling Cyberattack Simulation Models

McCreary, Bill
PortableVN: A Generic Mobile Application for Network Security Testbeds

Mehta, Sohil Sanjay
Identity Management via Blockchain

Melton, Austin
That's how I feel: A Study of User's Security Mental Model

Misra, Manoj
Mobile App-Browser Extension Based Authentication

Moll, Maximilian
Vehicle Routing Optimization for Humanitarian Logistics in Disaster Recovery: A Survey

Mudge, Joseph F.
Probabilistic Classification for Industrial Cyber Risk Using Deep Neural Network

Nair, Suku
Toward a Quantum Resistant SecretMatch Privacy Enhanced Technology - A Case Study

Nakamura, Emilio Tissato
Context-Based Blockchain Platform Definition and Analysis Methodology: Results from the Application in the BlockIoT Project

Narayanamoorthy, Jhaghapratha
PortableVN: A Generic Mobile Application for Network Security Testbeds

Nassar, Nader
A Protocol for Service to Service Authentication using Token Challenge Response

Nicholson, Stacy
Cross-Platform Malware: Study of the Forthcoming Hazard Adaptation and Behavior

Niyaz, Quamar
PortableVN: A Generic Mobile Application for Network Security Testbeds

Nunez, Jesus
Protecting the Unmanned Aerial Vehicle from Cyberattacks

Nygard, Kendall
Identifying Insider and Masquerade attackers in Cloud Computing and IoT Devices

Okazaki, Hiroyuki
Formalization of Security Requirements and Attack Models for Cryptographic Hash Functions in ProVerif

Parsons, Paul
VKE: a Visual Analytics Tool for CyberSecurity Data

Pawlaszczyk, Dirk
Android App Dissection on the Wandboard - Evolving the Platform Into One-Button Solution

Petty, Mikel D.
Component Selection Process in Assembling Cyberattack Simulation Models

Pickl, Stefan
Vehicle Routing Optimization for Humanitarian Logistics in Disaster Recovery: A Survey

Pujari, Medha
PortableVN: A Generic Mobile Application for Network Security Testbeds

Puscoci, Sorin
Feature-level Data Fusion for Bio-metric Mobile Applications. A case study

Rajah, Edward
Novel Extended Federated Authentication and Authorization Framework

Raje, Pranjali Sanjay
Identity Management via Blockchain

Reyes, Pedro J.
Component Selection Process in Assembling Cyberattack Simulation Models

Ribeiro, Sergio Luis
Context-Based Blockchain Platform Definition and Analysis Methodology: Results from the Application in the BlockIoT Project

Saldamli, Gokay
An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server  
Identity Management via Blockchain


Sanikommu, Uma Maheswari
An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server

Saqib, Malik Najmus
A Survey of Layered Approach to Threats and Countermeasures

Sayan, Carla
Semantic Knowledge Architecture for Cyber Security

Seow, Hsin Vonn
Vehicle Routing Optimization for Humanitarian Logistics in Disaster Recovery: A Survey

Serpen, Gursel
Misuse Intrusion Detection using Machine Learning for Gas Pipeline SCADA Networks

Shaker, Nabil Hamdy
Design and FPGA Implementation of One-Time- Key Cipher System DNA Based

Shehata, Khaled A.
Design and FPGA Implementation of One-Time- Key Cipher System DNA Based

Siddiqui, Najam
Out-of-Band Authentication Using 2-Factor Image Matching

Soviany, Cristina
Feature-level Data Fusion for Bio-metric Mobile Applications. A case study

Soviany, Sorin
Feature-level Data Fusion for Bio-metric Mobile Applications. A case study

Speelman, Craig
Towards a Method for Examining the Effects of Cognitive Load on the Performance of Cyber First Responders

Sun, Weiqing
PortableVN: A Generic Mobile Application for Network Security Testbeds

Sze, Arnold J.
Smart Voting Keys to e-Democracy

Tran, Vincent
Protecting the Unmanned Aerial Vehicle from Cyberattacks

Vajjhala, Narasimha Rao
Novel Extended Federated Authentication and Authorization Framework

Valli, Craig
Towards a Method for Examining the Effects of Cognitive Load on the Performance of Cyber First Responders

Varshney, Gaurav
Mobile App-Browser Extension Based Authentication

Whitaker, Tymaine S.
Component Selection Process in Assembling Cyberattack Simulation Models

Winkler, Heiner
Android App Dissection on the Wandboard - Evolving the Platform Into One-Button Solution

Wolfe, Andrew
Smart Voting Keys to e-Democracy

Wu, Wei-Zi
A Novel Approach to Identify Confidential Data in Data Leakage Prevention Systems

Yang, Jeong
Fundamental Defensive Programming Practices with Secure Coding Modules

Yoon, John
Chaining JSON Blocks for Secure Transmission of Mobile Data Sequences

Yoshimura, Togo
Formalization of Security Requirements and Attack Models for Cryptographic Hash Functions in ProVerif

Yu, Chen-Hsiang
Security Lessons from Building a Back-End Service for Data Collection

Yuan, Shengli
A Study of Anti-Phising Methodologies and Phishing Detection Algorithms

Zahran, Bassam
Cross-Platform Malware: Study of the Forthcoming Hazard Adaptation and Behavior

Zhang, Xichen
Probabilistic Classification for Industrial Cyber Risk Using Deep Neural Network



Administered by
Universal Conference Management Systems & Support (UCMSS)
** San Diego, California, USA **