Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccc2/ccc2016.bht:"
@inproceedings{DBLP:conf/ccc2/Al-ZewairiSS16, author = {Malek Al{-}Zewairi and Dima Suleiman and Adnan Shaout}, title = {Multilevel Fuzzy Inference System for Risk Adaptive Hybrid {RFID} Access Control System}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.9}, doi = {10.1109/CCC.2016.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/Al-ZewairiSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/AlhanahnahC16, author = {Mohannad Alhanahnah and David W. Chadwick}, title = {Boosting Usability for Protecting Online Banking Applications Against APTs}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {70--76}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.13}, doi = {10.1109/CCC.2016.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/AlhanahnahC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/AlqatawnaHAK16, author = {Ja'far Alqatawna and Ali Hadi and Malek Al{-}Zewairi and Mariam Khader}, title = {A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {65--69}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.16}, doi = {10.1109/CCC.2016.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/AlqatawnaHAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/AlshammaryH16, author = {Esra'a Alshammary and Ali Hadi}, title = {Reviewing and Evaluating Existing File Carving Techniques for {JPEG} Files}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {55--59}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.21}, doi = {10.1109/CCC.2016.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/AlshammaryH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/AlsmadiA16, author = {Izzat Alsmadi and Iyad Alazzam}, title = {Websites' Input Validation and Input-Misuse-Based Attacks}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {113--116}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.31}, doi = {10.1109/CCC.2016.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/AlsmadiA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/AlswitiAAFH16, author = {Wedyan Alswiti and Ja'far Alqatawna and Bashar Al{-}Shboul and Hossam Faris and Heba Hakh}, title = {Users Profiling Using Clickstream Data Analysis and Classification}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {96--99}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.27}, doi = {10.1109/CCC.2016.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/AlswitiAAFH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/AssmuthCKRMVSFW16, author = {Andreas Assmuth and Paul Cockshott and Jana Kipke and Karen Renaud and Lewis Mackenzie and Wim Vanderbauwhede and Matthias S{\"{o}}llner and Tilo Fischer and George R. S. Weir}, title = {Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {144--150}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.30}, doi = {10.1109/CCC.2016.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/AssmuthCKRMVSFW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/Babatunde16, author = {John Oluwole Babatunde}, title = {Experimental and Analytical Evaluation of the Impact of Security Compliance on System Performance of Web Applications}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {130--136}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.19}, doi = {10.1109/CCC.2016.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/Babatunde16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/BarakatH16, author = {Akram Barakat and Ali Hadi}, title = {Windows Forensic Investigations Using PowerForensics Tool}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {41--47}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.18}, doi = {10.1109/CCC.2016.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/BarakatH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/BenchikhaKZB16, author = {Nadia Benchikha and Mohamed Krim and Khaled Zeraoulia and Chafika Benzaid}, title = {IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {35--40}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.23}, doi = {10.1109/CCC.2016.23}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/BenchikhaKZB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/DrooganW16, author = {Julian Droogan and Lise Waldek}, title = {Where are All the Cyber Terrorists? From Waiting for Cyber Attack to Understanding Audiences}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {100--106}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.20}, doi = {10.1109/CCC.2016.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/DrooganW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/Ghatasheh16, author = {Nazeeh Ghatasheh}, title = {Fraud Prevention Framework for Electronic Business Environments: Automatic Segregation of Online Phishing Attempts}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {89--95}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.17}, doi = {10.1109/CCC.2016.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/Ghatasheh16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/HalasehA16, author = {Rola Al Halaseh and Ja'far Alqatawna}, title = {Analyzing CyberCrimes Strategies: The Case of Phishing Attack}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {82--88}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.25}, doi = {10.1109/CCC.2016.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/HalasehA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/IsmailII16, author = {Umar Mukhtar Ismail and Syed Islam and Shareeful Islam}, title = {Towards Cloud Security Monitoring: {A} Case Study}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {8--14}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.8}, doi = {10.1109/CCC.2016.8}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/IsmailII16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/IzkiW16, author = {Fathiya Al Izki and George R. S. Weir}, title = {Management Attitudes toward Information Security in Omani Public Sector Organisations}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {107--112}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.28}, doi = {10.1109/CCC.2016.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/IzkiW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/KhaderHH16, author = {Mariam Khader and Ali Hadi and Amjad Hudaib}, title = {Covert Communication Using Port Knocking}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {22--27}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.12}, doi = {10.1109/CCC.2016.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/KhaderHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/Moore16, author = {Chris Moore}, title = {Detecting Ransomware with Honeypot Techniques}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {77--81}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.14}, doi = {10.1109/CCC.2016.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/Moore16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/QbeahAS16, author = {Mohammad Qbea'h and Mohammad Aref Alshraideh and Khair Eddin Sabri}, title = {Detecting and Preventing {SQL} Injection Attacks: {A} Formal Approach}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {123--129}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.26}, doi = {10.1109/CCC.2016.26}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/QbeahAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/RenaudW16, author = {Karen Renaud and George R. S. Weir}, title = {Cybersecurity and the Unbearability of Uncertainty}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {137--143}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.29}, doi = {10.1109/CCC.2016.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/RenaudW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/SaadehSQA16, author = {Maha Saadeh and Azzam Sleit and Mohammed Qatawneh and Wesam Almobaideen}, title = {Authentication Techniques for the Internet of Things: {A} Survey}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {28--34}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.22}, doi = {10.1109/CCC.2016.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/SaadehSQA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/SalemZSS16, author = {Asma Salem and Dema Zaidan and Andraws I. Swidan and Ramzi R. Saifan}, title = {Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {15--21}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.11}, doi = {10.1109/CCC.2016.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/SalemZSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/TangAL16, author = {MingJian Tang and Mamoun Alazab and Yuxiu Luo}, title = {Exploiting Vulnerability Disclosures: Statistical Framework and Case Study}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {117--122}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.10}, doi = {10.1109/CCC.2016.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/TangAL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/Zaabi16, author = {Khulood Ali Al Zaabi}, title = {Android Forensics: Investigating Social Networking Cybercrimes against Man-in-the-Middle Attacks}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {48--54}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.15}, doi = {10.1109/CCC.2016.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/Zaabi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/ZaidAH16, author = {Aisha Zaid and Ja'far Alqatawna and Ammar Huneiti}, title = {A Proposed Model for Malicious Spam Detection in Email Systems of Educational Institutes}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, pages = {60--64}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.24}, doi = {10.1109/CCC.2016.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/ZaidAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccc2/2016, title = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan, August 2-4, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7593909/proceeding}, isbn = {978-1-5090-2657-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.